# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9c164895e933570ee69fa3ee8ee5de35cac10eb2416bec21036b81a5e7e1c37a
Pseudo Output
c4d1086ecf92bf3a153e7175eaa6a710a33974ab79de002bf62130f231054b00
Key Image
d4c1bca781f5831c1fa08683a81ca7e3e207246ec8fac6eb715524c58fae0d65
Pseudo Output
88f0d94f3227b37759f01c837d9ca869fe95a4c51b16ad5c916232bd8e6bf608
Key Image
26c16b8c80985643c8b5d3acb11b4c5a62d0211b79121db7e8ad437098457c27
Pseudo Output
e6149624f1d011796bbd776d734b42eb0f45b8b300c1a20d465d8fb50abbc102
Key Image
58ec4586274c3b352327be63ba885b8a746e3b8b7115284f83884786d9e55810
Pseudo Output
a8c41156ce1807ddae5bd13b3948c7181e1deeda840f4a9858148b426cb29e54
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a0e5790d57c817245e712bfb89874aab6bc0b412070ed07c950aff98d866aa09
Commitment
74b1e3b5460beeccb56a46351d157965054891af6f052ea7b3965a93c3c62919
Range Proof
672 bytes (Bulletproof)
Memo
e2a94ff53c57d77c2dfb48cdf1810ea3e8d957b183613e52be8da04c9ec98fa41d7c830670b0f2d2e2e8214798eb89b2762342b4b31aa55d15aaf9e584ca115719598220e8334a86d693d432ba6dd0e94359e92c165fc78136d0263dff4b0b397cd544770619e9911d121fc0d295941f0b32a6d1542aa16044edf5ac90ae911c (encrypted)
Stealth Address
009f68401138e149a4d0a2d8f7f77bad86273fed26e15307d8f66eb82d18ce19
Commitment
d699a35dfdfc60174fc297211e1fd53b02aa5767ae6250a6c63635d5fe54c26a
Range Proof
672 bytes (Bulletproof)
Memo
ca99eef2324b3fc94b89c6802f1edc695f925f890a54bef256f892b3342d0fa28f733ba3f8fcd65735b119388798f64189d9e538438feef61050a427e09cdfa4225751f2468b1eec0cca5349b30403e9c8bd44711ca9229fa65b5a223c54f1284aa94eb7451d6ad5de8d60dec4bdac257efa1530176e2422b023410ad38d22a5 (encrypted)