# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
eadde8b3245f82b63daf4f33a7907e88eb0034405f007ebe1e7012a62faa0938
Pseudo Output
86e3b0a47b564ad5168b211594b88febbda0fc2bb04a44d0cb8de0cbe7ca7d1f
Key Image
16996528b951a0ed41d3eaedb335448874e5faf82f3818629d06e441d1726d30
Pseudo Output
82d01111924b517eec9a2346cf580e7b5fe43507c4ae1ee44337d396ed348c74
Key Image
0a485498fb7305e43a30e88a9f254315ad356023ba65284f5f54a666745bff5e
Pseudo Output
2a322e1967a7ded648d87d03f5be5b8e2d078b77a7c85e51f83f71381222a323
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
38ac425be09e1a37a5f8130865f4eb6117e9febea2f627da69320d8a1c44c86d
Commitment
329ec605b28e501eee9d26a646dfb71d8366227f82ac0dfe86dd49f0789f1167
Range Proof
672 bytes (Bulletproof)
Memo
844d4ca70c1252aecde8890add1247c1bb5ee47cd67ac42f9ac9b733337b3ab11563aef7ea575c5a7207b6f97bee2ed11f0eef27b5cf594398c720af308351b2fa09f0e04b86237c30e69efe588540326c37302c2e3556969c88bd29ad98c3a61d376fc275de044fa53319db4651c687d2cd01901420b975cc70788afc1a02d5 (encrypted)
Stealth Address
98a0b90f839acb2ffcd015dc38221d3dceafeb8eca180c86bf3609a878c1512f
Commitment
4640513939751563cbedad8818586850d80db2f9f20790076cae61cefc42b72e
Range Proof
672 bytes (Bulletproof)
Memo
56651e3f63fc4320000f2f7ca6690d9a7486dcdfe013d078a3e9e7cb406fca64d7ff6655f3f9fe3909e60998a515296a3b0e4f70431804f336a9f0e04728f0a7d86eb3e87b9c63ac569a5ff80aa4ae4a2e7939b6db39d17c495784b769a6333673d85a1b8cc43cd4c65e3ba09561dcbd1ae78ac14ec138bf9919f6d90712d069 (encrypted)