# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc10020937b8be90de11515cc330a05b23537255166db7920733058b4f34a37a
Pseudo Output
bc9673dff50598fb5866ec3aa92d73b846d6eb44f7872ab6e0d2a95405819053
Key Image
34eeb6b9d8fbdff56ff953d451953d4869ef882831e7a1c18441b73393e60603
Pseudo Output
dc57e770ce90d00e79b30bf230f1dedc0efe9544b8f4ef04d1e465fa7e1d6531
Key Image
cc44abacb49e76dda412ccc65cdc1c1014132888b880e0a422b49fbadda0524b
Pseudo Output
e83be63af2ea3eca505a5ca0489b94f02097a8308a25622706b216ee4c115b48
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
baf0304c621188bd8676367d6a8eeac901f653de1c4d991014ea15908cb00953
Commitment
845a8631e3f00eec9174a1487132a1467a4efe1a53291d3979f1581af2781107
Range Proof
672 bytes (Bulletproof)
Memo
4d32f21b05d454446eff4a76e4b8dab22d1e76e7d967a6061529680c61448abdbfe2ff7c9f2d65ba4ab27f73a57e3b9e51d5cf2d26a058fd3234a199e1c1f1a4c2ba8299c0d8134eea2064b01564244eb2881bfddd648cf13becfb1f5d4f3c28e696333048c4267d0f20c7e59e8c19e50049309c41f19d6004b8d6336351c3ba (encrypted)
Stealth Address
b2e6680cf8c89ab5faf8f151390a9853d9ceb73f00c5d23320441fe10e4d1929
Commitment
f6878a4be3e67e4e29334a8a6365be4de00a91ad88da66740ec25446a3eec918
Range Proof
672 bytes (Bulletproof)
Memo
1513ffeea309656dee632eac5e8556c8c2013b3f6b12aa135309a6120812dc7a26e3ee4d8177edb93a7da1d095fcd06fec8bb2080a7f4e98753bfaea978275b6f1f3705898f3742c43e376d587cda16b6bb62430cc8363e9b698dc94e3103da94916db2844ef33a396e5f87de3546630476bbf090f941cfddaa7e067ca159cd7 (encrypted)