# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ac55a26d856ab1459a8ee41e217db090b36a2cda193f32f08759eb5abe00da4b
Pseudo Output
ee84bfd4bd8c3c601e2babf26f6001ad286f243be56c7a4678da197f2a557d53
Key Image
4088a7aca8a7f72bb5b663ca1a1ef4371f60d4dc85feb8b5bedd624cea037661
Pseudo Output
5a52aee0c4010656ff5662edd6adbdfe29caceaa90894a2c32f6a2667113ba2e
Key Image
bea54e0a10155f206e880e60ddd397ac3596d827185fefb902509a907622b66b
Pseudo Output
fc89a706378ea30bc4bf9583e5bc48b92d0c75e89f8fe8194ec8832d755ce009
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64b0e0a0033ea7bc0a93cf27feafa3ef984c5434d9a041ecfc52ab7fd970d23b
Commitment
5a43b94469a464d642a2832857f278a29e7b778396675de2b02143d85454dd7b
Range Proof
672 bytes (Bulletproof)
Memo
89cb5becc0218d11de968fcdbcdea09d4092e09ec0dc08f48185826371a863515fedd258a6b82fcf665f6e1324190326792230fd313aa5c54a5c8b03d0336a3343ed8c10163c72dc2ad979fd9aeaad78c39db469a67fb6edc3207ed6b4ee6361738731761f670e1e7cdcababc2acb7f91f540110279acb8384420cc8386068c7 (encrypted)
Stealth Address
d8ce85d841aa62b4bc1039252ab86038d4cfe883bdae22ba82c96ad49236ef47
Commitment
deb39c8c02d8ce7ca6907c549c8ee9fbda12dec3ca23d0884756ddfb9a718827
Range Proof
672 bytes (Bulletproof)
Memo
080802f737cb791ce30c8540864899f7cd28664028efe0b4a4d861d2a815ba2f979a66bba463d77928895311baf7edaaf7f42b860890d5cfa76f43c2d5946c68575dc92517487993ea1ce37e6e8cae7d4e9529183213872d994a95b95c1ef453f5a94d66e5ba208cf4608041a7b2952a8af79cc1a270bea5e58214694a2df3c3 (encrypted)