# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cefb790892f16a34d51c5c466429c2c8cdf7a99c555783ac7163504c18631228
Pseudo Output
dcfcfded3c6f2285530f51b68e25e1e136bbec6a8d786a538545af55b9dcb847
Key Image
0422a9950257288aa0f4f280d6c69afb21be7e0230c360ea891c0a90d878d63f
Pseudo Output
5eb8e60075068f2e4bb91ae4e198f11396a891d49514991fec7d91023ce9f60c
Key Image
0277269682c5f5a86ea47c99632a1679f2ea77d61b4ca724e5dc19195947e460
Pseudo Output
a2cacb524316fd3e2980222dfa47b8212a4d1cd49f933c0d3976e1b81161995a
Key Image
6665018e83acfc75432576502122ab1cf11c5639c23c699c0348cb289cb5704f
Pseudo Output
e63ecf231c697d89744c42b969bec60d99ecceb5a2197180383af895498da46d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
28b15d52cce1544dd47960b6a4b4980589c655561f97e8177b346229daae661e
Commitment
e29e428a80193c6be89a09afab282b9048c1242027f274b94a2ca20aefd37819
Range Proof
672 bytes (Bulletproof)
Memo
f8eb345346041799839098b6608d5ac1ed3866c069015df9d65c9c831d2155273810769caacf4e878d8daff057a46f77452b37e6479ede2ad8f0cecab089faf63af5bc23737eaaa10ced836b352029552906e1ec0fe10933eda80199259ef009cfd3a821d113da474e0a48408afa7d362a493ab67c28cf75d15fc4cf5476f2e7 (encrypted)
Stealth Address
562fce85c7a584a4c6b009b6c0f8bdacf6396ec9b1532a4805dbe33921bcbd3e
Commitment
7cf2a39fc29eccf9bca1cbfc5662334010dd83c456a06f0100a6524d5a74d70e
Range Proof
672 bytes (Bulletproof)
Memo
d352174b75bcddab1dc5d1d6b7f7454b75c21eb56218a43462ec8a2eccda75fee1c54f9bdaf637cf909dbf9eef5cc2a2e158c1ef5f86ce3a0b0b3b23626f7367c6d043d17987f02ae7084247815c6e58452ac2a200bbcd70fd4bdd0597a08658dd676836149a0712c4698a0b36d8cb9afe3d1a3515bcb6e2e803c6e5a5690dee (encrypted)