# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
cc38408b9c072d2e779858d160b87c7ba419ba487d64b376bfdff894fcb15411
Pseudo Output
262fccd16ce394725ca0e3ffae0f25fb0bf7b5603eec8fea984ca813d9b51178
Key Image
bea16931100b90134d1112fff899ab92efd1fc6e5696c7ae116da0eada83661a
Pseudo Output
d61b18db8b77ca9c88952e6838981b5e50490cdfcadea95447fa728cd2687411
Key Image
ba32ef2db77f907fc3c6ac2aed192f4079c1bcc3268a016af23389592d3af801
Pseudo Output
da383356489fa5dda0e4f82f90a93eaf912efe90c6612d92361187078e23534f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ae160dec1573be6036f4f41e53144e10585559ed9dded404cf1f5aabd6032910
Commitment
74622d9cc2b40115d976dbda07c844ad3a84d9b574b34f9dd1d77f6b93861035
Range Proof
672 bytes (Bulletproof)
Memo
914380a5993d5d4d05e3ed07c4d0c7056b3ef35e4bc995fe810bdcec4ac8f5bf8ff09cdc80f72dd7684ccca0456e5c207e1a69f2b92af6d52a64877a72ac56ad6b18b3700cb6e701be8664f2d4fb9f6fac5e119b3b7f9eaba9e25fffd4247c7212d1e771685e79c8551c6b17d5a8ca670e533861c50babff6d331e7d1908c609 (encrypted)
Stealth Address
3ed8eff882c5993767b76b00f8b06fbce69ffe47ffe414bfcab70df202a7c10c
Commitment
48f7b9baef09705adc4632b7a3c134ef42c572d206b9ee801c82d704764a155e
Range Proof
672 bytes (Bulletproof)
Memo
f37e4c453abb7b7cb9f8352621ac6221d28029278f445d80d1aa600b527acdf280d16d956a64dbe9c488fe2e48cdf7264b6e132203307726c128a005ada4ceeb86f3f9d110916937d2cf9b8da080affd1c0ddf39e7982e980f375cb4e024f96f133638bfef4de999764ad03fdb3588799df63c915012b6b0b2360ffc8e297b9e (encrypted)