# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
1635504ba88db6445900095d6cb458914c82d4ea900ed3a05ccb344bcad7c546
Pseudo Output
6a5f29a74263cf5d9db100d0ec1ba94c7318dc9fd3cbffe0198064f6efdfe04a
Key Image
b4effa3c891d600b8c024b03f060b47c868d81855ef4196c198ae859ee7f8505
Pseudo Output
38a031827a1f302befbf4c6ee6deefd38e323f3a58240643ea1c52e17e753601
Key Image
62aeaf249d348a8ac41cd200bf9df5d1de61110fd05de008463e95ed3de89e0d
Pseudo Output
100a6622bd2a39ea7143c84ed90c43cd98426a332b1162901d6b3df67385004c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8a5956f2dbdc2fb1445eee04b81a3f94b0071bf265f1f4fa31d182cc4949af0e
Commitment
a42dc8d0b4280bd40aa734fcdc3f62de9982406f68a569266972aa07c710b718
Range Proof
672 bytes (Bulletproof)
Memo
185a4369c3864718bfde209cebadeca8ae6c7c5f93ba76868c49f110c41ff58755c11122e7b7afaa39bbaba7e17d97ff26f88af31aa89cf26f71fb97bdf9a198b390692689a04a7afbd76e922fdd6c5fa9e3d3385d3de40e9affd8ced03b21987dcdc11177f8d26471c2b26187999495c7cdcec69ccdf4ca4abdfd904006cde9 (encrypted)
Stealth Address
68a11c8357f353e53b99365327c0e096fa21cad683c5ec764aeae8fba48de522
Commitment
b4bfeefc5414d337f3f483e287b80e92136e86f839c27a44a1f46f6f43b4df07
Range Proof
672 bytes (Bulletproof)
Memo
8cba3c06058d5d88d6e394cf4464f01ea68942deda39ddf3a674796a93f7695d91c1eb4a5abcf5743ad0ca36ab5592b7dc2d53529b2a83589c479b3b069fa0298e6bc207e85e6dac45dfc13a6d53e65479471de6f6dbd767743ec17eaead5a383efecf08e5f6862e970dd78dffd8ae40e6ab6dd6fa2dd48a60e2ba640a14dc23 (encrypted)