# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f8d0753f47cc7530dcae764fc41340b93fab67d650b9fb432a48fc6ab737200d
Pseudo Output
4ac4fa3b49dc7572c266146645a08e2daad9bb942737ec9a639634f8f871123c
Key Image
fac8b93d82320bb21c02ad39f2ed45f04ac540c233e5999987597fd429718156
Pseudo Output
1e57a38ca2f98099768f48a43ea0695bd4385b328d92207fdca1e242110ce60b
Key Image
b03f1534bc970cf20ebcb685ff68042cf95254fad30241337556df9e0aac567b
Pseudo Output
728e0f6fcf7f4eb8449486c19f7a3f2962b51dc349b40af6fce9165a3c715660
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
38b7868df65c268ac8e751b62263f8e5e7dd919e0270f60017c2650dd8750662
Commitment
3e02eea5064399c8f94f61593170318d16eb9f0f825b0106f81971205d98ca1f
Range Proof
672 bytes (Bulletproof)
Memo
cd0dba860a0cdeee516659c5c384965603d57353e69184cd853699fd8a6b9984599daa08a4ec6a02df5e3bccf00c055ef754236db746d2d166a7bde1b2133ed23c4b890487626b063ac88e905a550e42ffa92be3da875a3c8dd8280cba04963fe7f977e831736aa29ca0569b6eb5e6437b2982a16a70905ade87e518827ce239 (encrypted)
Stealth Address
9470976f0a7180328f5f6b9f692356ae1da7e258d20607fca9dd199124af6943
Commitment
3ea3664206fe9b50444e2ad4540572b1c9f767225f0997f3399a9c4a74dc5737
Range Proof
672 bytes (Bulletproof)
Memo
bba80c1a91203754e0777d43dfa1d0d2aac8df813ff611e39a63c800648193a639f1d1e7925df603bf95ea379d861dfeee33db00a36972e2f7c0ef8464e9d95dbc9f76c9964c21779087089766c6f19ec8484c389c77e2670117b0e004191b80cc45ce641f263916bba21ece2e0b8e91dc9eeaddb481ccf38c4f3fffe77fe0d2 (encrypted)