# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a47ec2525a59ab567662fc3d6e5d9075c5970345c3773792941d00d1f363b367
Pseudo Output
d63841e9419a6864bc5cd1a3597d7aff114f6d19b3dc7624fafa468f8a7fe175
Key Image
4a661fc7e8e46b8e517de5a5f003e8dedea5ede602935757e96f48833d577601
Pseudo Output
8a13b070400725a5239097a71160722901226fb37e524cfc3976a88b784fe01f
Key Image
981f735ce15264a5ece233a527c186281fcb97123e124ea061727fa35454cd6c
Pseudo Output
ded50eeb37297593c8c3355dcca0338b3f14f793d77038a432ce946aec3d1c22
Key Image
e64d0bd9ce32a9262d4f6107f9900db1c03a1980fbc0b87bb788cfeaf1fbe571
Pseudo Output
6c3685bf07bedfadc296ed223303879320a64db53d7e49a6436bc655b6ee700e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
66383404235bff03958858e7acd6b734d8ceda9fada7825df168033d4cea7148
Commitment
f24084ca8ba56a196d6a6bc1ed696be44028e559543ecbbd5828231731361d30
Range Proof
672 bytes (Bulletproof)
Memo
98308784ac0f7a5135e307bf16786dada19346f05f1ff46d6e3ad8d9c4fcd92d51819e4e2d51c53c58752e7ce5024e7fc0bf788dd04f1d3dab439c530147473c5dedd9570eac29b1201e11ae4f08f71b8880c923fafc1a13a08f087272d58a58f1ef21386b47ae781db13fdcf3c2d59a44ca38d5125860109e38ad08d5ea20f3 (encrypted)
Stealth Address
90626d2fef7d9166488855e87c3255657fc97d1fa59adfa81c88934aa1896162
Commitment
528a3fdcc427853f099a4dffd6f26a386237c824f4e3f6e4a2b6806dd7389d04
Range Proof
672 bytes (Bulletproof)
Memo
81296baadbc349fd65013aaa7c5b5d6541c8395a41a9cc3bafaa95046990e879ae987187f86071504659e16729746fbba34d4e74023d84406ea33f569a20d823b3b96d73af595b543588f461c8adfef4a945bba803934736e8f6b2d29146e901b51ee70a5c0c38b303b77e78d35e76ad25cbe800cc8eda6a7d2fdc7d5bfef00e (encrypted)