# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c23cc82f0b8e3f9df694dd8522b5b52b2728d639fbee62b6becf5e460bc89f21
Pseudo Output
76c4b7d0159b24251f4a54d8171e4523ce32d40a65965edb0ca5be4853987358
Key Image
02af13978741808d2e7c2ad538d504f0e74fbe7b9559db0f07d6a4560ea8da06
Pseudo Output
24c66a2964e6ebd83762b143229f807d013124dc2b62d24a014dc1b022036631
Key Image
f8ab3c684148497f878408777666cd32fb599114a576538437fb49b2aa172d0d
Pseudo Output
8a94ed6162a70c50b49c6ed4fb8f9b173e9b2bd993cdecb8588e77742d6d2442
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b0378b7e3cacc609236b13212d9e2be35c5192311ee5209c4ee886ced5375d70
Commitment
9a9dfdc1bc777f37e2f0e5c90539607000c75d519d5b6380ee62f3248109e739
Range Proof
672 bytes (Bulletproof)
Memo
33f89c68dbbba62fffb6ff7c5c64b37cba097b3e711f6dc292c2052fdec8047550b86a05c5e3dee2e550eff36f3bd5a2120fc3a1e903701c5c2315353cd8dfdc1bb456b096160766768ddb846b6f25f04e6d636413a252052e3de0e8156165ed0f5715a0600312a602592e86507dfaa35fb1aea7d2dcb9fd54c8429452267e82 (encrypted)
Stealth Address
823628f56b8a9efe1dae65874848481b6a4a8ab6d9fa7463115df43bbc054042
Commitment
e2a204a5c37b4d06c581b94c96a5404675eb76a3287e2d3d4fd5a4a2f1a2a54e
Range Proof
672 bytes (Bulletproof)
Memo
affc0fb3173cb1f5feb9acea4f9ea4eb054124c984058c006689f592cf1d47890c849b0c3a8ba1e3f8e1a19aede09f1375691ca7e9a97e75ded07d60005e790653dd61d502f1ea340594828f196a59ad471b63ba43f685b5bf1725aa93de2e9ed7a74402d26ffdab3a5d86245cb0d232b477e4fd49b187ac19cf72baf99396ae (encrypted)