# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7223e4c4fc0ed152a08bc32065e632e543377b4676e5f31cfa6e517f2bc4246b
Pseudo Output
b0b733c7bbee09bcaeef1d7190c90b318d27ff8aca6a1c0d9df35cb1885f192f
Key Image
ea43499610d28442b68c9599ebbe2c79e5676874b741882a3b359a7dd2535716
Pseudo Output
4a84cca239339f9f4281084d17c0b127f6e124a11bfd57e18b466a1330eb1528
Key Image
b280f15d469a1cce76e660d94b112d2ef9e42f0d564b9fe467448ac40f876853
Pseudo Output
18d1b65ee2bdfd902e23d2e1a3fb41859efc836d6293ed06cacaea3bf3d2a719
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9a0f95bff3500c3229fe425c0fa9fc1d43db8dad84cbdf0c9fdaae4b44f73655
Commitment
700e606f0b6bf0eb7c7459dffcfe8049495b182f18202671d69756da36f3715f
Range Proof
672 bytes (Bulletproof)
Memo
89e58c9020ed6fa374841fe0c37c2e55f9042e396873b6bf7d9f7f5b7a8c30372d1d4d139072d829e2654315a0610c7c5ed39a9cf2be06a33905b8eee610a65ee23360d9b55d14bbd1a4cea72caf79957892dec3dc7a68bc35d4d0a03e4c2f881463f807c41207cc55fe66f792314a12ebf4b048398ec136471793cf8990e2fe (encrypted)
Stealth Address
f4b40573b32a44dd82e14c80581499e360bcc1fbb0cad07146308df724b48d07
Commitment
9ce9dca60622de34ef7f39eda5568ea2e51f66f38e4a1e1c62f993cbcc563760
Range Proof
672 bytes (Bulletproof)
Memo
3a775104c16f872dd5840e467f8db4a09a3d43267424144451338b0dc832b76e9d1d17daf9438084951ff5aee604dbf6aa58b8171097226d5b1df695176c3a78d0a5730dbe92400852a1761b475079c5497b575eeb6a1fa9fd1f84ae79aa41c1dfbf644805b78726e73798501fc4d44aecacd0d60468b8851e4ba165107b690f (encrypted)