# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a0152a5474639f49c0bdaf0580b8f9ec3dde0041444beeed52069a9e8611b3d
Pseudo Output
3e07bc92a90cc22b048fb6168de75a7f4c7058dfd9948398d355deac4539684f
Key Image
b85c558cc1cc8974c1579806946acf5b6c590761d4110e53bc899d5275e44362
Pseudo Output
42b5ff9bf9bca3b8efbcaf40251c53f683497e5f357986acd3ea3dc26d736d52
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8418c98d2f52967a28cde8240c0e1abb1c56a96be776d0a8a8328c8e22f00305
Commitment
5a18e166edae5d7c94467fdf7accfc3a526edb483979e4794e36b6e39d51dc10
Range Proof
672 bytes (Bulletproof)
Memo
7046da322164b5efeae79ff4ae3e8443f80677823bc2c3bd979c463e6e58577a6f01c572a86142ee6feb167278b65da5e9aa5b21198868fbddfa8816926067f243b056b876f4d3119b42f0bc4497b2e92f63c71338bf69386eacb5e7f967f970daace11da605b7a7530316114f287d9a526964e1892c24c4788625ac07617fd2 (encrypted)
Stealth Address
5c18e4fc6f1457dc906999ae71dbbb573e0e5e84fe2a28b9a964eee5a96dc125
Commitment
96da65230b12dd629754ee06d52c9027670f1df681e72b3c278bfe46d5079841
Range Proof
672 bytes (Bulletproof)
Memo
3547308965bc42848b4f1ca7bb03576b8f3fd9c9298fdd831c76ff10446d08acebdcb8f118454b365202278d64b57b25011a11ff151f71ec3ba8e2028237b0fa6ecd4505fe99a113eddde96d8433bf11210be4a95235c427eae55a3a4ebcca4b6ae3f2ae7a0c324e3f93e1189ff515d5acc31a958a4dfa33e4582f84ed7c3bcc (encrypted)