# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
24a41afd221a4f3f89e312b0426d46ed10f59f779cd043691ace0b05a24a627c
Pseudo Output
d8ffa05b632ad82da871de3eeeb0583c1e05036505aed5ef23ef4898296f9a58
Key Image
b0b73610595fdde80ddd93f202b97ffa18910e6a1c9dad2335d6ad9640df975c
Pseudo Output
c4984292e5fd149f1c8d39625a267e0b562d1dadea2100570db3f3cb08f4f235
Key Image
70df3ccaf258319a7649949e888fa44140ae904de9dd61683555295025d19843
Pseudo Output
6a57551deceec6723f140ba9d564d9c822beb9f57ebf6ff7e2fe6c83e2ba2c3f
Key Image
3e0cfa474f35f8c9e284bf95e049d898d718e3cbc2142fb848e782df4c74475f
Pseudo Output
ccc455fe4ba2c2b18c633f0aeaac7cdb8e03c33fb7241e4c109f692945e66d44
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ac022618b3312a1686f376b625a446e7ab95628674336651e8125ba76278a37
Commitment
fade85b6ae4af32673fd093541bc4ed66fdaf58720fa653c16264d7f810fef6d
Range Proof
672 bytes (Bulletproof)
Memo
0fd4d85a5a3016aaf87b76b9088a3a8c7142e13af8d45aef4cffa40f570d8173c753c9df923ce785f688822febe58901f06c6e29bd65a099c9c98dd2e234a2efb369a84197035f1ba3b56a60afed44668b59a653be818393dc762bd9f73f150c1cbe9f35020e94eb977917454bd4f33015df5f11db0fc8e45b59bb0b0b1e9f1a (encrypted)
Stealth Address
6e6e881f5b0b9ab3c6ed4b045628393bc4fe971d91903203789f0da19541943e
Commitment
58a6e26f6f4d84356888193bb6be0a952296816b74886b720d06794fcdb92e7a
Range Proof
672 bytes (Bulletproof)
Memo
28408c4f7f1656c411e4a11c94e0f9622d61a2b32afa4c2dbe2140b58f361a0cbfff8a0f25956cdd4faab9927c1167d9029b7c85d9fed87f1cec30a528c0d96eaa003ce26638acb618bf25ddf603269c8e3e912d0e85e148f9050ba8ef5257ec1d58b11b1dcb2faff1eecd6aed6e82cf721a02ae090a5f976d6e35df7b17242e (encrypted)