# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
104d1112c9e1093d54d8c78ac987f232af7fbcfcf05cbfe283dc057369eb774f
Pseudo Output
b61b3a3214901cc453a41cf4bce5eb696b442eff37bcf7164f033e36bbe91e74
Key Image
aa1566b0bdd1c7482065feb0f9005f33c5652a79caec0503a394a7748f071601
Pseudo Output
ec10a323ad87ab101827a688df3e39d2baa259fceeb7226a27a82c2951948a3c
Key Image
24679aafcf7750cbf1b184f3f90879ab901349042cef280f27c148dcda802446
Pseudo Output
904757e618330744d5e71b596a3e346b78fb1035bd85a22ac909dc40572e8126
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
586078aa2c137f4e80da21f0cca2b198978bcadb9eaac6c966daf7ef24a9eb4d
Commitment
8a2ea2ea2e02bf54efa8f43a0b022d2ae14622fb0d5e8787e8ca585341f5f170
Range Proof
672 bytes (Bulletproof)
Memo
8ba18432ee26a09f3895391045dd06b95c8281210dffe592d5458577ef676d9170cc2c3f4059b134fca6798c6f1eb0abca77fc47813e7906437480d7f3bd552f87cd0789e464bcb6145dbd6183e8f5f2b770f7aec88e86c9e152c8773ac95715d5122549c14f959562971592ba565c8ac8f413a71a27d630bbb244e5cfd8bea2 (encrypted)
Stealth Address
16c95ffd0e0126a166b4df7214e7eb844d30c69bd0b5e55a7f4b30bbf30cf847
Commitment
20cadf7254c277eb490b89919bb3148d58fe4c030bdbbfbfc55a5bbaad9d682f
Range Proof
672 bytes (Bulletproof)
Memo
4d52c19c984a03caa460802523d4f08749596290471398e61ae0e928c365c687c676d38e001f4042d7dd5f8d8cd8735ea21e0400cc71573f5d8c044dee78fb86a8fe01e8fc8f2e41dec89528da9301ee8d40b954d207c53afe000f02e7e85e3b883437b1f7a44b63a54eb1bae6151772f123f7ee3844a2840472e3f78362ec3e (encrypted)