# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c265c796b92d2bef6f5074144a3483285a0d2812fc397125cc924e52f29eec3b
Pseudo Output
e6f824373d61e9ba14499e13c379a5a4261578db7a167e3af3aeab653f9d2614
Key Image
662c6ef586cbb41c8d6da5dd0063f2ef62a7e05c9e0de3bb9e1ea9c49a742c6a
Pseudo Output
5452754155e9ab50c809164e90410eeaf07027172be6b385f6efe10a84ef0e5e
Key Image
aceb875e7111551fb704f037fe189d53c38d6d4a4dcd6db03a83102e3c577113
Pseudo Output
ac7f4a49454c60d3df6ecc89e856bd275bdc67abe5b19c643f5208f15b532453
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
369f47263791d8dbadbbf03792e40ed8ea4e9c499d7a80673087b094b29b8d72
Commitment
e244e57a35e470778e72c35c377c0247bc2c4e59044f33a803b4c89669ae8b67
Range Proof
672 bytes (Bulletproof)
Memo
a727fefea9d983e900dc03ce2493e81b26953831e0212f8452c5a9d2750e60f0d9a6241a3d22e9bdc3f667b355b4a6cc6f97f45e2ec2a66683dbaed067bbd97bdd88d346f911ce54d99d28f815d5c939721d8e7720fbd0e8419ad385d9efef66e6d9b5aa6df021d44df7612081768ae78596ceda0e9486064e28bb6f8ee04a40 (encrypted)
Stealth Address
ec80488118a1c8cf2f223e3a4a01d444ddead366e8a59bcb011122fe89942d0c
Commitment
ee4f9bbde8070c163bceb8cf3f44f560d20e738d58d6c1bca631d15b80d50c62
Range Proof
672 bytes (Bulletproof)
Memo
92b656e67cc9fc5006fe9f523cd0e584f2ae79f9fbe37272d2c38c1c67b60ab6fbb6eac4ab75734045ed959aa85179df1b9de6d5a35e2c92cd338d8ebe0dae7cc89de32398be89a1cd64cd586ae9aa1293b086f2f8c9728ec455b2a95be237d44b242f5a2b4c71ecf18c3c1aeb354a5a81b958b3c0797d7cbc0ffd1c90733adb (encrypted)