# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bec98c6bf5f070282b516016b77d5ee2647ce9c3e10a201d9317ce5164ad4e0c
Pseudo Output
a88f4b1f4696d451d153e4ca7ed379c3efd395b9f4577242c596347b04ef8214
Key Image
387bcb55c07441e83b5b3ebfc2d49621a499e0af0f26495c5289df2f0af6e06e
Pseudo Output
468c3c0c318aa3c1a86de756c20c2afb00bc29742704286da6c6362bbaf8721f
Key Image
e2a444ffc10485473ac03f63f4802b8388f1edf6669eba8349fe8dd90a375464
Pseudo Output
7efbefb5448261f8480da3200b388863570344c40497e63fad4888452f3d3c3d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ac5a13bdeba6ade696f009e9f9098111b714ba5061be3f3217f1d25d9972a415
Commitment
487a964761f7762c115c1524e834fb3e5913eb0ba156b29a320fc96e92eebc4d
Range Proof
672 bytes (Bulletproof)
Memo
31eeb639ffad9cfd95d142725fdba74d50a9b97994358f9b621129592dad546e00926651c8952ad90e2e2c8aa32b6bc4ddecce4bed6405219c8c726d3efc4e06d72c54e3596499c150a12e838b805baeb18f909b42a6bac130ff0cdd04e0c6a9f6561513ce4d8692abfc9ccfa804149b4973ef89a67138521e3697dc402fafd5 (encrypted)
Stealth Address
12485aee4f11091aba5789880e8f60cba2dbfaf8446e8a4ba67bb81aeafd3f53
Commitment
f26e8f918a5b5e517a52a7d3708744c6c12dad0baacdd2219f0bad84da2c1c23
Range Proof
672 bytes (Bulletproof)
Memo
5eac8c7aaeaa8e5cc1072c3a174ab3bd1ea399b749239b380788101cafa4a8be60dc505f281d9eb81933cbf49bdbf3e838a361df396d8ed1485e58e3c8aee0f517f8533b3c6796d152b4cea8b27eb691b9d3bf2709ff99d19d6bdc1a4a94b0aa33532823495b702325d9614f44526567007ced482bf6da180934974216400bc9 (encrypted)