# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
40d83c52d85770f1e46733944ca648834bddf15ae27f2c473ea7ea75da0a3345
Pseudo Output
eca5a5bb408885c6afd81e1a19c2393adb578e90afcc124965593a39c9451149
Key Image
2816abfb31015003a2f3ff0125e58ecd6a25d806951f46d8dd47159831309978
Pseudo Output
aeb4ca6c151e1cad67570984910c1885c32746a0a1ceee1aff35e0336363ac2a
Key Image
d490e419071294e434a6f906b3509539424d5d196033503c3860458e32359922
Pseudo Output
14a2ab2b671401c5cef313e587e83850754a2af8513b5607aa1db44acc5f210b
Key Image
d85595bc40887b4467ebc7f57b792c36fe7c09d16ca7b9df2aa10568d8eedd13
Pseudo Output
7e47bd82d6a50ea753b6b2f7401ba97cc3a63cd745f7dc93423b60b19cbd007c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18fa3f03bd875504bc1fe71c1bb1ef95cdf23df22072ba1fe2dc85ea386bd35c
Commitment
04cb141926ab9e6546268345073c4569fdc0150cd2cc7272ddbfc17e9915f53c
Range Proof
672 bytes (Bulletproof)
Memo
bc694326cdcf4d8c2bc6289c92cc2edc72e959b658d4ae38e74aca1020d51e8b446754a7b65691c175b034f8e8311668cd3a2c6c4550f60175b39d28860567aeedf0c7ca76c4a78c74ec16a5daffb1cb4098f7cd2cbe0090daf14845756852b1d6ee21939a3aee9b3cc6b34b6108f62f43e18156749014a257d4a45303ef5e7e (encrypted)
Stealth Address
3ac1558dbea262249a00f5179b23656b4ab83316112601a9c353682508bac327
Commitment
b015776c7934921a5cfa220d2d348ff1dc91fe04a54c623c43290f74ee2b011c
Range Proof
672 bytes (Bulletproof)
Memo
e9ed9e4e9ecff5d39b1be229b0c7bfe7ca3d79679a598eaa235d85598e171990f58c34711511f6684840d9ac165eaa29211543d9ad83d9e232733a7a9e54424ae2f9ffcfa988bf623fd22fb41b7d5cc6c60acc67ac2ed8799494a80864882b991c5432ab29ae0ddd6f26e8df014f9f256cc0aed617b970ab9445fa0d94200916 (encrypted)