# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ea489931ef872dd7b2896864c6fbc0cb22af904aee70308adb9b50b61ce06c79
Pseudo Output
e4f150a70bc44e6a25ace7f3cee01469c78b859d3bd77b4338107dfd1e7afc09
Key Image
4424b126dffbee2b4ffc909900ac5751cd1c45acede9e4920f4c097bf940386b
Pseudo Output
f652c8b9a01cf00863972196d08b345a1d6cd8bad2b0e212bdb7e168f3fc5801
Key Image
a2fc5a274fe8f1d597d39a95f83e645abd0d0d7c23afb6de0fdb6f2a0cea0332
Pseudo Output
8a52d43f37b10e4bc8413da498ef695e1ef75c5855d784e33f5813aee7f88822
Key Image
02fa9c93c393c0394b605588bed335989291ee59924ae5fa7d9910370c318e0c
Pseudo Output
8a600af80f1ef2a6f9847221acb92d52d3f0844c9384b8077c24429e1f5bdf2d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a07b5961c8b7a8c1e9177b7f655f5db560122592fabd83208076370747564e0f
Commitment
7c520cb729819655f646b0f1792250c67a3356465c692110a339a48e55ba0a4b
Range Proof
672 bytes (Bulletproof)
Memo
131b9e73440c810c56eb7d9b03fc5a0833cfd0751d9bbcccf17ac41c73d2ac529900bd6c0f5990c30ba5d4a2581cca3f1a725e9330e89346c21ed44e8b40dc69661c052342618a50ccecc0b3cc285561f38784ddccad76e6c7dc82ee1719e6ceb1995b66fbf7420439c4e5202766d18c6e75ddab7e20d0a7f39e4cdd9231809c (encrypted)
Stealth Address
866417c0d54bff3b91f29b56f1472d7327a200697fa4297440d4d4fb7860c276
Commitment
066729d491d89b141f23ef0b2734bed4522fbae034fbc3af7396a1d3c6033660
Range Proof
672 bytes (Bulletproof)
Memo
985f4ce661db8bfb429d464dfb24885e72ea66cfffcf402bab036f4c90459ec481680b3f16df30cce97cb5b4d3fbad3899a195330a68b091f86aa14723b7138fc852ab108e63b28404a72a5ebe60ea863b567cd2b65e19769de73336f130b0a669d135fa0a743c797ea26922e0a21ec62f11db06d59fdc0ae7af7593aefd7fb2 (encrypted)