# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7219974e52c41b1fe5db3e8ce08185e5c9e1ef640bc4150dc109e15ed5d8c710
Pseudo Output
fc7feb81c290f8081a3417f43bcb618500ac6fd3a11c1d34275141639516f51b
Key Image
545318a5801530f5a2b805ec0ca0e6169a4f9243865b95501d8912e86f0e665c
Pseudo Output
ca2c0ac58243cd256d45a7b4bafd8f763e4eff5096c75c73866d7a5b0e28515b
Key Image
e4b53f74a3f620d6e0070f696a4a364f039b95d3d58270b99199f0294ade6502
Pseudo Output
beee8f7db5af3bf3750356ea5cf6136425062f5a83b91e22d290be7ea62fec4e
Key Image
404709bd4f0feda33a203f2c73b03d6d85dfedc7114587389da5690802513628
Pseudo Output
94ab5a5e1e81996a74ad1d73f8ad5181765d59af8d90de012e535f4584030e50
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
123e932813c6cd10351ea3b0ae4a40ed8862016edc432b33f3b67da8dc270d51
Commitment
9ed932454f3de68652a4cfa842158346e41f52abb93e46622473a401b4775523
Range Proof
672 bytes (Bulletproof)
Memo
a4874706e1c8d8075a872f670f4cf6dc99c49fe659b21229ce4f440501eb3c2e74f5e3b97db759d87c8783dd9ce449d0016748f32b59f10620ff76464b80ebe63e8e78404136a89b20fec05b9b42841b726e36b8a220fd92e9308f45fa15a8cab43b112e1e9fa25e49a8686e38581bcb10adbb48273c3dee3ace080f10afc682 (encrypted)
Stealth Address
9c62f0a8714c6e2d36c60478b37c8d892e5e750dc04a8b978e76465721ea2f74
Commitment
589024033a574fb59930d53d74902d41848ec40eadc1608688c0bd1c9717b53f
Range Proof
672 bytes (Bulletproof)
Memo
e6aafa5f0e2d6aac62585c1824eaed463975f667c438018d71b6c8783de35a98e3c0b8ebfcd9058824a36daa3de3ae81272a90ec26576323daf0089ae2ef55f4f598ea26b0f54a060e7d1f5eab2dd77971cc00fcd43ff7885abbebb54e24c03cf0ab555961d47a06e2964d8778892525b2dd53aa3d3429d793395bcdc6ce7725 (encrypted)