# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
421c8d763103e5078b03dae33086d1d9d7fc62c87a1160b97579bba082915209
Pseudo Output
0e8935aeec90a428cfeabd9cb5dc0353c3a9fb891a2d528af98792359e53c922
Key Image
8c4c469abcd2ce1b8b2c6ecdeff15b0bb30f1b61eac890f82fad94af57603c72
Pseudo Output
36667950a3848a89f8f623672c72b9fb97e8278459cb671566d279b68134674b
Key Image
0089f907761ae2456a1a2532f44751cdabdcbd3b29addc28157896516d33475e
Pseudo Output
a80469787e05ad13721415495925f430231ad10b46cf6c3e639a69ef3ff91a68
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8aec6aa7ad4af683564ca8aa409c367d1ca9d7db1f2d95d6af4399cf2714f814
Commitment
64ff6e1c01583799bba971c93770b36fe5d107c3829ff02d8162c057a54cc527
Range Proof
672 bytes (Bulletproof)
Memo
b34447a482cff58d6c235ac4f66c1ed25f6b098cd19552908ba2374fcd0fb993d419f5f86b129fe46f822ae11b52a5514b9ce2ce431df4c981b44c3af24231d5803c856ee2d29a50dc46fab443965873ec7038bd0bb93035d147d47ec376e29a4ec60aeb61aa7d75209b9c7466f9318ffb30d86fc5159d1222fcb340208a7398 (encrypted)
Stealth Address
ec9901c33771ed65c0ba6c678cd8d3086db7095b37fea8b5083a50e885f56f5a
Commitment
26710ffca2b576dc8c078161582485ffb301331cbeba575bd6051f4bccfcf05e
Range Proof
672 bytes (Bulletproof)
Memo
464b3c4b5d29f7a127a284fa4828ca97939b5936ee9f013576081e027864ea028b285ae9d5aa891e0f973ee6e764d788b0429055336a3706193f3392a4bc1345882047104af02e04f14ae72560cecc4d08cbb89cb046bd52680331f2b842757655570eab861f5a29e56fc0201104a84fe22dfb40064f454c8084d03113ab6ae6 (encrypted)