# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d44119f3c517bbedafe383e580842816781145c8cb7f0f101b0a60944ee4b15e
Pseudo Output
7e2f30e5858f121a969d19d805817d9930ce102f9459a46c951b74a6a2cce847
Key Image
fce104e6f41f9cd7a50c881fdf7dd6b0dd387abe17078d21bc2b0022e0f1ec78
Pseudo Output
74439c35eb7421438c99e2dbd9ae56a71968b3be71ab353cd8d8c97c76620048
Key Image
5c709c1e05b914b6515cc18878bbee48ec3ad0dfa379ee4675e8fabc9563d039
Pseudo Output
94982cefe50f4b1b552d7aee900b39e8c96016b9b5f34be31abdac4336db854b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7cdd113dc31e5ef463bfad4b06e8b89287a4d437c532409980f925a35a0d3761
Commitment
b830024f42fe92030e59e77ca02a90a037d4e9b93727716ce00f0ba543a92e46
Range Proof
672 bytes (Bulletproof)
Memo
f431f325437a764f35cf961d3f751ba04a3679a5c08fae15675bc1a5254c5fb5e4d92db913176d2936615a0229baa6a14838fbc6b7baf75c3259d234b31c22a63e40eeb4d5cd3e3908e89b65242265933702df207de7f825a6bd39e090f4f495f7227720e800cd9a12da6dc71134ea1788795f58f8da862aa1a6f43146fb4489 (encrypted)
Stealth Address
9ae27e8c287f593e4b6c12b3925c7e53488df94581ca127b630f7ce94b666564
Commitment
884d601cd2a6d9f38ad69d6b53596340fb49fd3e4accb343a1ecfb4f108c0029
Range Proof
672 bytes (Bulletproof)
Memo
8c888484f09c69eb84d1605a4f29a74599715e3db264b331469f68dda2097fcbe208b8688243fa0ce757811831ad59569bcac9506aab6fe84400b987b12d0557dc05b5f6a1186470f71c119b09a6781ded107fb2c54bf78fffe09831cb44b2bd1a7fcfb1368e2063343cad93e51b04562db88b521be4780c160032f3fe877c84 (encrypted)