# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca8667a103c94e5295e386b5202ef8eccf26c33cf43235e9ba3d737224cf9547
Pseudo Output
e66f593d4e211b42d075adb1345ab3a3abaecb611c758348ffd164dfc87a3a01
Key Image
a0840a2e6ec65591008af9fcb6b3f5e0cdb6ec95b8bd644b38c92dd6a635723f
Pseudo Output
50874f7dcfb452bb557f04ab38cc1ebf5e64995c298a1ea50e1986348eb0b654
Key Image
90ac1b10bce113b11258b813aed031046a344c4c250bc5aaf63ced58f6a4311d
Pseudo Output
d8a83742f0fcf560f46b15fd429f6ea29742073bdf6764676c2992965baab151
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
90a5071b2e60af825142e774c172119bca4abbbf1cd2bd08c8fbcea943f5d078
Commitment
5e37c7573f882655c1468eb73d2f5b2000c1f40af8d012375541880dc2658b7e
Range Proof
672 bytes (Bulletproof)
Memo
d21cd0ad20c9657e01039642b5cba083a8332a694e5436394c508fea604900da2c442f7c87878642a0e2fc4a0da09e9a722de0da9ad66ad8a76d4be4a626df71b80a4504ba602680e959bb5321a09923510f1f6e4a93601b99d6893fbea6bbd8b0f2b7740124263268564ebdd4d2b9566fd05ae9a033f7f978fb4779f54ceff5 (encrypted)
Stealth Address
f6e66302583c37050acf3022697126bd370040c8ae35b1b99568584d3f8a1b13
Commitment
7e79acc289fb5ab5eb40c89fdfa608eea102b3c66b0028a9df32cf208c9a5934
Range Proof
672 bytes (Bulletproof)
Memo
5c51adf1e3e8cfb82205d32cd0cabdbab9bf78dbc5a962080119f38a43be5f66d2e74ee89ee8558a4b06e033cb1ce33a121ccb086a1080ae02ff0e6090e1acdfd13c913704018a80fbb689c5c6e00baabb409d9ef3dde6a9e23a584203fcae16e17a53c24c274f19e650ca2a3ddef57c017e33e2ac4907e3a127c3f9547f909d (encrypted)