# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3e3a19a0d35711068316c5f0c42312415e1cb8c80d3f50053b668be5325adf2b
Pseudo Output
64e18e4e75a3df4bd0717139aaad6ff92a30d02aa14eb4630fd106ffd862573b
Key Image
3488c7e73d14841c1b3c4e204c59aaa8ee435465a158be1a6adce7730e227d49
Pseudo Output
c42fe77f6057b5c11699e2294c7cfd9274a702cfd732a790ada5906c8767272e
Key Image
04dc584a45904d0f58cd5d3eb5ed322cd8141fc5d19ae5f1e229fdd4dd0ec868
Pseudo Output
aedd52bcade703f6812a52c996a09a71185814fd003bc4fa3a2a56802f278b30
Key Image
a67e0636cddd606446e07fa8d84c122d7342da0e9d22cb406349f86945c10559
Pseudo Output
d8a9ea9829def807c971af69b265dc82cd3f37a6567ae453b55f8f95dd157d22
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2efacd6fc4900a5e579248f183b1b2aff29f5ae91f472a08522c07513f814d59
Commitment
0ae174e93625d3c737991f65ecd66eeafac50cb75dfde08059300b58f34b1463
Range Proof
672 bytes (Bulletproof)
Memo
69ba07dace3d9c5414f0470eea64006874151d8b14df6d8e04b07756f9d41acd087fe3fe646b0e6926e39989263b6d6bbf53a760ca46d0b44dc80ec4d5010eaaace9b9a692e31b584e8866139714009ae1580423d35de2ecde70db9e01e6bd3ac5324ea84179f088f20e308eea44fae69e1ab03c97df25f9ae8baed455dd1a3d (encrypted)
Stealth Address
24625ab1dc7327c153ea05c75d381f29a75395d8f8d164ef939547f57626a953
Commitment
484aacf2e83cfbdb1f050c11c12e7314b63ac3fa50930bf02f5b185b8a440c00
Range Proof
672 bytes (Bulletproof)
Memo
ec034012661ef1fab60160337eb88c91f3aa21b9136c1b2e0de88b63adc9ac024cab3e5f3f4901333d569eae0a8d69cd113035f38c9822def1d02106c6f08eef7319f950d47e3cc18a5e9f1d0a618114668e15195051a1422e51914cb999412df63caf0ac3fac1c3f3778844886ccee64bc873e32be925fbf98d23589af74373 (encrypted)