# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4ab2e2c1271ab852bb4feed0c3bd2ffb47c5762d80c64f7d8b653190b08524b
Pseudo Output
340c48f2d32f470e0afbae44eec4e9994cab116e394b7ec540e8e86dd32b2055
Key Image
8ef6e1e9018b011735595dae6072cb5d22d38a74b59b40cad79896596da2a264
Pseudo Output
5acfd03c6d3277914b10568671c5fb4c372f40672d40ad8d8e74c56e53fc9534
Key Image
a4a6fbeb4f3e3f469776e99b2a60de601b3c92382bc914e6499c13ee75c6fa67
Pseudo Output
24f57377990ab5c93b9b63fe86ece97a51a9d1eda0c47da63ef6de7dd568286d
Key Image
605d78e477a041a00289d286cbed2feb2a2a7526f8db3ef7e098e637a708c06b
Pseudo Output
b8c87a3400f7cfec806248a0882bb72b6027e68ea8be6a698f31a5507e2db476
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54925c274f838a0c41c202bfbf510839bc172d92d136da8052ff7e65c9004b00
Commitment
4897a650a23fbd8bc49c504bbb061aac507f9494400f377182cd223cb950c403
Range Proof
672 bytes (Bulletproof)
Memo
3ab92d6c7cc07f8c28b2317ceb4a5b858f6b3be90d2e2cbc311a3be680f618c2361fd411b3c88aa07e8fc196cce86b14b0ec17b96aced2f424da95117a63973fbb2e51bc93f5be7efec045a3db2b66e4712d02a65cbf8308edfa5f51e259a6ea1402e702f1c137d7cc9c5c6c6e4b9b18bfcec5b8671f45b9f3139bc16cf03ef5 (encrypted)
Stealth Address
32da4b14bc081256e0f8732b6bc0633e539e869ba77d81ad3a94e6c5f67bec55
Commitment
12b8c80cc60497fb19fe1b5a14ff92fc02cccda0bba09e039d25a3447f20b427
Range Proof
672 bytes (Bulletproof)
Memo
3f0f9e79387ea20c34b9efec8307de238165dca3864e7bed9a31ce867a6286335600900724b66f3981db6115268636e046b958f3018f1e527c1bd9a6c336b0255a131a90f1629ea20fb9469a9df3af6e210e770af41f1a931046e62d0895714770d51ff6fe7d8f38113c0e0e154296147383bf7902c955ba16a59c9cf8e220f3 (encrypted)