# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1ae0597351716fdce363251a713582192e3f575101586f13ab2b453aaf66351e
Pseudo Output
caaaf063bf58ac00a358be42e996b4b60457fa1eff4bc6f12e891314c7ff5648
Key Image
7a568f30a3aa6ec072632c3f6160efe6a9195d5bef2e8479edbed4410ba08349
Pseudo Output
84853221c23afa05e59dc1383c7788d46f0f958950b5bd7b3499fafb27f93b0f
Key Image
b09637fe2ebc734c7ae442c040c15988a707b2b18963e7baddb9360301e55053
Pseudo Output
d6706457b29a1d773d64655ffaf37154709648b18aeae4a0c11db2ec68c60934
Key Image
9af36028bc70bc24754af7f217119c60b5228a785977293bccf342ff7a86887e
Pseudo Output
fea0e71969d3a35ffd24c441a89c1373e7d271e7a8db1d7acbe840dd49453d3e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8c02dcbcc5ffb3364f7486b30b94661ff600818dcae23d513dc658fad0283d50
Commitment
487038875d0efa0491b2b3ac9825ecc91295c267bdd7bbe523ed72759eaa1a01
Range Proof
672 bytes (Bulletproof)
Memo
294ebac36e0d53ae85e57b2a083a375476cba29b17fa8d3382ca919058e350ceab3f68c148408f83f5020c50b468f17441f883e276a7ebcc493e602c8dcc4ed89e61e2ef4042a431b71a6cc45b77eb243a0cdf105ccc67afefc77999a54591cc09d3309918075f81a8350b9b180cb3a61ff93d42fef1b9dedf82d8db3a93efe3 (encrypted)
Stealth Address
7c7a95a1a8557ce386183b9fed94984ade1d99b740c0d0c26aa07863d997e460
Commitment
6895c35a2216b14d725600ddb37df52642638cce357cb54cafab19355a37d45f
Range Proof
672 bytes (Bulletproof)
Memo
e7d131d7c5b01ac6dac3df2165bfd331f118a774d6327c0f3f1220c815c12b701812eaffd9dce6a8df1dac4495fcd9b7fe84ec3fee49e1c6738b8aa6ae5c012412f4387b1a61186a9c7608a0e9c068b211f5758d79850522e6638cb37ba81363c78f836221785c0e158cff3e5326194b83e68eb4dae5b21132d3ed6fcb1bad92 (encrypted)