# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc0df2a2a9563f2d97610c88597ca3383c7e30b37ae87e88992247c6a560330f
Pseudo Output
3eaf858aef41b6dd1ee566863e80d5a17089737f153d300f1b2e1273d3b55248
Key Image
a4036525e9eea5f92700a5cf83898bb1b4b8315842b2aa304cb8bca139ad2654
Pseudo Output
e804e468c1dca435c9e6a1848d6b3ebec5ef5888f9934c616076bd69b4b60b39
Key Image
086df75533b18099dc2731117e6d667fb1e07f987ff1277d137dd9b5523c8c25
Pseudo Output
2cbea6467e83df63098de8eb8ee7497174a1276794bda2bb0138c222973a6a39
Key Image
067f7d5a8574951fe491ef3f05d7bc7b7f1bc7ab318e27abf58b4361401d327c
Pseudo Output
3c5e9cde7abcb72c5e4c17e41411c738cf7842f93d415edbbce9ce0ee4a9720a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
300aee54af8e2504f2ef858bb376b11172880f4b7792b76fb5003014d9e72b0f
Commitment
2cbb750119e9c6d9673901e1f1bb1eed51bd0e4855deb291d40e6e186d7f3945
Range Proof
672 bytes (Bulletproof)
Memo
6fcd10edfa38b1881fcadc57c2ca28a6f78693d9ef8474f791401a8443648d9a2738ca48b37bce613aaadf4891a31d58d0e3aea7b491029a413b39c0d774a97a12109f928b4fdad6acb58bae9924e3d16b121d93c055e58e8fb50f67b4542bdcfa0c0c75159b1128db966b4f25fd882cb3cca7cfacd12852ce5dd5084f5944e8 (encrypted)
Stealth Address
54c0bcda00c9f0acefa2f627f12433baa9a1f00623058674b966e880d6e5a26f
Commitment
ea1aa1244e934ca655e298ffb2dfde06bd3a17a31d7054f76ef636d943231360
Range Proof
672 bytes (Bulletproof)
Memo
afd3284ee1a3502615342ccede612bf973a5b0506235dbc7d848ededca9c3bb116a27966c7295f50692b964ffdbb56c4d38516bc3326f8aeb802c5683eeeaef1efcd900c02faca74bc43104d885bd186a54b6c11e289c028d3846c7f4d11ced338718af3417a387310386c72f705cd962d04bedc3b373a6d80634ace7247d28f (encrypted)