# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
44df0f983ffd93c0fdbac40ec8c80faf55a4799b32b432d086d3dd42deebb253
Pseudo Output
fef912a2e94a5c12a22168169878aa01e27b0330d9654b09c51202dbdb0a5155
Key Image
3ed3649fec50a9779dc218cde830608a911e069adf1d2881da2cd4353f000812
Pseudo Output
5e5b0cf7cd053ea5a53370cf7e0bce6f79f0f12f7f94a24fc6ba747a8e4cf156
Key Image
d2d00aa5aa2188900e3f53cd0a819f629ecb0af133ee7d70b81e8a34bed35600
Pseudo Output
e26f7ba47ef003e4bf0b739ead701b35e91990e0a931c88f5f7d56a7866c2d7c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b80c0a35b068ede4d8161843eda04e8d4c0e401c2e69ac9dcb30a0eefe24f57d
Commitment
ca5853601832d98b1022f68c29a7fc22ad060acbfe8f3570dd7b709262ba8907
Range Proof
672 bytes (Bulletproof)
Memo
ed79c1a779b39587a4149b13d17a51962ac595db70c6161ea6b09d7610d2d95baf5ddfc66cb582bf3b16ae387e1c2267f8c01d6120f8d160c5e5fad628839713bd0bed0e294fcdb44242ff4e98ec1feeae13f852110ceba360e1fc24bb9895c096813fffd3abf1154a4d9b1dcfaf1971573d942c21d76ee79f6269b93d805d8a (encrypted)
Stealth Address
a81e0885ddec059217093cc02d70370924b4fa0287a900ee4b728f38b1274d32
Commitment
187ba8e61fc8adc6748ce47dbcd1ccf3cbb01d58d28861492623a58bbb506b31
Range Proof
672 bytes (Bulletproof)
Memo
37e359aae88f53f0c2a6793b90c59430cd61a62256d70eb7f0c1d5b52d586af4e9ac94b3f483d04dcbf294200dbcaab0cd9167dff2c680472156324eae152150f89cd7130175edefc63e7ff52545cf716bde5095f886b3b15da2e4b36ea2f51007fa64ac9742fd959db06ecc1a87bf21de23961246d6bb0a408a51430f88ae3e (encrypted)