# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
62af86a0afccd6aeef1010b7d8230dff78ed4a447b8388c275de2b8c2066e704
Pseudo Output
c4a355c4b06a6c32450bab55b38bb922e7b87c6a2965c11d7e56e28c50dfd448
Key Image
ba7181ba67d947c08f7ecffc0a68c51238b20cd5545591874bba7938745c0b70
Pseudo Output
d221829b8a5984f5267384d3047aa2375dd72f7ed88f9c583d66added731105c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
32a7d83a06ae655d43f02ddf9e35d5638b47fec0daede6352f158211016d4b0d
Commitment
22c9be5eb501437bbb2619d383dab6e67b842a3747f455bbf385c0c2f37cae50
Range Proof
672 bytes (Bulletproof)
Memo
3a27c73b021adfa355c0165de0dfc09f4ed7f966504f4a6d41432d6935be126bed3b1107cff289ac514be69a4c6bd90e186ae5dde9b53af1688b4ae5aa497a4006219cb1f4ef03d41a76986361a5245f4a03461cd93d95b1c18e014efed2998eb80d4439a096fc748f138ce643bb70438cceaa8ccb4ec480965de11821ba6776 (encrypted)
Stealth Address
d8de752ad57c01368b1294ffc46f9accde49c0091238cb458468759c7c484019
Commitment
ace3e1bbf4ac808dbb019c4a0ef8243801cc6efbd137419bc77342a958121320
Range Proof
672 bytes (Bulletproof)
Memo
80b8541702951ad129d9de4fa84bdbe443ff3161470257648311fb11b16ea042b8fd2686e198b038f0a62c2e16a05a8fb2f4586ee9f5eee0c0cd43699d42bf927d0e8e3f4001d9c564269b8e258489961285bb7de7f7699ea6a8fd0566cfe97d89a50d9a27ec77e55eb9feec81b8d2d0e0456ad34f0c9a56df4a3da864fe614b (encrypted)