# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ce02cdf7367f6119385642325e28ac282e0aaa3cdfd619569d8178a14323a44a
Pseudo Output
225f4720bc09dc17f734d3637054fa6eb56323496b536f4b022ab47e143ae542
Key Image
7024fa9d870b593d0bf0c13d704bb72193b6086c2c67db812436ec35beb85150
Pseudo Output
2012dc8dcc2c857d3db25f2b03643a320440bde7a39bf16b2e1dc958f3a7423b
Key Image
d473d5e145921f362664bb1d1856cca9c0f23784ee1dc517ba257cbfd6af1a35
Pseudo Output
026b81894bfd608fec91c7f4415958a3fee32c939cf336a0ea3342049bd4034c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ecd65f1b772a667c29c4a3318fba0be0a261c69edcb50fc5812c01bedd36955
Commitment
462ad6d8a63f1f53f1328ece111513e19e19ac7bf37ce96ae634bbab83e0c550
Range Proof
672 bytes (Bulletproof)
Memo
4aa38e72b41b03535260ca8a47f2e99a9a599ea81c71c1c5b2d9f5463b20b45fd9893ddb054bab140430f8d76c2cd55477c19be1f397a71274c564042c3f92d68692f8a50a35a186012ab03341230e202851c91b0f7330512853b1a3b590e2d35a1979f6d67184163754c577dd40d26ed5ad9131ddbecf3fa50360356c1207c2 (encrypted)
Stealth Address
629e17091a913b29c5e75e133730940433652108ce7336e7f2d23e289afc2c42
Commitment
088616ae315d4693a98e881280668e7955baf7de2b19f85080dc202629a58c49
Range Proof
672 bytes (Bulletproof)
Memo
182386d8853f969c8d77cacfe679f1e636b082ce5604bd923ea24bcaba128f25a8d10a9b82cb933d585f769a02e06cdd0f34e9542c388a4837d11cbf05c2409020b4838a6cefa29e1bdac19b2c89d0483d6bb13d22f9430a652bea2c9f46b3565f2bb335e3e5d347a8ddf2847023db4d1e84ae46c8c7a2885c1df4311b519184 (encrypted)