# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
de1c951df8448f38f266b924e35d0f068fe37ef1377111b81335d06dfe7ac646
Pseudo Output
b25262080813199f696044b7de06ccb19a9d238d0dab6402f3179056b5a0ab60
Key Image
58e5ab614bc30531b99c5366a851eb1116ede77a999eeee0be233bcac514a407
Pseudo Output
68ae855bbd90c7e2673ba5d02bcfff905d632bf9f6b69f17b3f3abe7363cc97b
Key Image
e02f579684f475397593f61f0c807460b276b301f1f1edeb6fe147dfdbf05f0a
Pseudo Output
3435c5ce5d792a5c6a5e061c41522e3246431c3c1b223b052b6840c2163f9801
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
022af70fb66cd54228c850ba34d28fcef5ef2c94d6647c03e1a316ccffd9cb4f
Commitment
f8d91125f22b1ef4ea881c52da2d0a52a65ad13b91a2023426a35b48daf4896b
Range Proof
672 bytes (Bulletproof)
Memo
bcb070f1579a8e5cdc0f237104c9291af02b7a86058f4b216ec88d48195596fc6a6a99603f0e3fb50bcbf6708e7252cf0ccf6d93ee9edb9d40d11447eb4ad9a6eeabc19b340bb5d0bde07c0de6f47bcda35ca262b3783ec94be9962a9b7f899cadd57d37d27a071e24ce8ab1de40dba61022ad664f5be978be7f9c9a115aa766 (encrypted)
Stealth Address
f883443d00bcfbad2e9c65ad5486b63d059c01b0cafa25e5086453d23bae614d
Commitment
1a2a813d13d0616b1f198724d2fdf8b3bfd0a4348b119f073eb83292e3642d47
Range Proof
672 bytes (Bulletproof)
Memo
44a0374bf9c57a79a75d674eb44aa100de9c4152a563cc0eb66c837867cbd88d4fd81ab265ae28c15f586dc3368b51cccc9b6342dc946c3911fbcb47315d2fcae59efcbac2c2892768895dda6113e37f362afd517ab74c90826edef0ff8758b48a9769f71086f62c9154989631da4b45bd0976e8b79c89dfce226790c6711cac (encrypted)