# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d8c17792a94bde45a4ae7d76c74868fc3a6f416a029bf2f11fd570533794f123
Pseudo Output
560281da6615e25cb0b2548d162266264b60e71ead8dd9c563b5ec0ff5de3626
Key Image
d823afadb2f25fb62fda8468890333fb0b7599bfc949cfcd8cfa0cd823c8660d
Pseudo Output
c4418fa6f1c57a2d6b0b7c05fcfbe936e618a55f9be35e3e96e80a2945d01e15
Key Image
5a0007536109f64e179b8e9c35710d97312653b9d20de9fedc2e9f03cddaf56b
Pseudo Output
b87b6769e9ba6a0f8db29e404429e19075ff1793a4ce8376d34222ce2f73ac52
Key Image
1c021626e70779a4204cadfe0d21afb56945d8b844fa86a63ec5f75eb1b38c58
Pseudo Output
ae70e032a46351726d0557d9856edc2231d957c617222499e7207729076c9051
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8854e9006e4e47798480bf3dcf3a1d8c55da7b6d511829d39a98180749e0ae23
Commitment
a8c3f545ad5a3b9395570df758d058c9692ddd1666f086671bf1cb1440b3a701
Range Proof
672 bytes (Bulletproof)
Memo
3c351d8796ee64ffc42a5711ddebcc3eafd3bd08ba9a6147252a1a7d5ecaea5da568593d29d54153cc2a6ab5e9cff324daebddc9f7b8ab02690d9af259c65916ad2269164cfcde2c8b1f0b1df5d7134c10ef039d6b041ee0d8f4f5ec549cc23f459d7d688158d45f12e03e2335bdbcfad245edecc17bc8f1a04beb76cde92678 (encrypted)
Stealth Address
e4d5935e8ae7aac547f9193f4a7b0a9e9e5a57e8be0e0eb43374f49223aeb916
Commitment
7e083f215a8929888a82bfe8c34c808e91e7674e14366f2f7713dfacb936d834
Range Proof
672 bytes (Bulletproof)
Memo
d089e13386326c99f2c7ebfc9ed66f247dc72ccfab2c88de710fa5afa1858fcdfdd1626569a3769df89bdc3d3f50447ae8e8279fdc1c15a7d53b30015a245d2e86520b074cb32d50b6d910a6c7b3ab5480fe463f8914b91cb8af2295326fcc492bdb66f73423812a5a6143386f99c277b58c74ce1345a56959f51172ad10aa57 (encrypted)