# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9ab46518f3b402d56de664874a7ad89363c112602fa13ed3e823705af4d9a06d
Pseudo Output
e05572b1037beeb361f73d51b743380ff3c739bc43edcdcb46f18d002c5a6e0e
Key Image
683598000ac7a9abcd5219b94fa9b613340594c05e532e45a15ff2cf3c85c647
Pseudo Output
7a19116ca15979823b8baff560bf86548011a51628b34a33b5da65b4d977df1c
Key Image
9eb629ce1ab46ed45d1512385cf05ad354749bc96280c1d5228674642a5e962b
Pseudo Output
a8506ba95b05cda14156c81a3423bd57faab7e34a690624005fbadca35487663
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
527204255ee7a420e3c771fd5e325fb7f0d08a529b64acd38d7210dceb14b73c
Commitment
b4fa472af8205c698cd0e3d445d04f7dbe764d2a72c00ec83fc43317695e8a1a
Range Proof
672 bytes (Bulletproof)
Memo
78cb33152489d2dbcda57a365fbb3360a61551826a17a5207f310e9dd879fd835516aab2f84c7a1b94473080a9d0eb1b5c7481459b3e760b2ed2310ac82fe2f0e9275de3e7004a96567f369641a847bfedfed58a4a3ce3887b291f37f25340d51bb9ff14001097ddea4147a797fd7fa9f37675d4a38a3cc0e0602c9b62eeb7f5 (encrypted)
Stealth Address
920a6061d837f8aa0cee3a5388d6d0ec16e1b5773b55a1ad58e836f628cd7710
Commitment
60e58965800b2c6dc25fd3cceffaf138d2d53540108bb3e8c4825ea7661bcf53
Range Proof
672 bytes (Bulletproof)
Memo
ffc039e00a7f4221f2e87351cf5cf2db59afd7a52df6f3c515551de847c8ba0cab8c54b848c7969944f88ddfd6bf66eb2eda20c345b8681b9bef1044ea6636b1a4d818f68f11f2a61afc9accf1f1c557d9ec4f11c1d12c4fc11e9b93c548c8f397078f8249388853664ac48d370503327d9c477ebe016cc0e2fddb87b0ff0ac3 (encrypted)