# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
529b84c0ff24d045ab7c91d565eb463680f4c18f707dfaa5f2fd68fece9eb154
Pseudo Output
0e41982e5892640fd72f9ba6f5c1abad48af1ca8ead44e4d5591ad97ee6e8c7a
Key Image
3ecf9fcb1ca4455de85e46a4c553aa18c9186e2e36e2b3820f43eb2acc8fd676
Pseudo Output
547fb29e9d83ac702ca6c75688f57935a5271e9e7b4122038381be889081a946
Key Image
06441e1a3eceb1d799ddcdea8d56fcb06968eac9d4cf1b3667ec04940c7a217a
Pseudo Output
023447a2f16d3e85cc18554ff2197831d4431554607eb1960fc549cd4ce0b232
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a6a403ca9c9c28cb7b4e3396972cd812943ef62c5e6a2c2a456de2615623e010
Commitment
448ec6b4a0b426b053d57144f7669dfb7bb4e7354814f369874b70e92f395326
Range Proof
672 bytes (Bulletproof)
Memo
5ce727b4d391d9af914e2983e8730a79569d36a91f7fd834471629b2ce6878cce362114850b416f77cce407c8ecba1c9922499f02553ae7c2849cda93ffbf29008792abdc47637146beae271639d10c6bb965771cfa2e8a657d27820a01e75e3018ba838cec3fd0b2eb39bff6043aaad9683e53bfeecaa7e6ac3b15154eb0cc6 (encrypted)
Stealth Address
42133d3d05e77478800b4996121a86638ca81867b23e2a49bb539497aacfc033
Commitment
bc32e47c1e96bfc1dc81e456d393a71017f28277d6136d75fcd3f05925228558
Range Proof
672 bytes (Bulletproof)
Memo
d18598290e4d7f461768ef86b72a46daa04c6b079df484d31f3f4438eb9d3ad288b0780354aa464b6507e76232f07e63e34b0e34c6803851b11f4ae7ba7e00396d9f35c18d02956029a95b997d72605c0797a18e6e36a6323e311e131bb4a10a6c85317dc327cf4916f7e0c19a9968a4636f6d8caa4234d238f835278a152251 (encrypted)