# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4c329ffecb644b38253e07bb0d811691246e8e7304cfe16a881ea91e7aa6bf74
Pseudo Output
debab6a5c2b9410af7234bbd58e161ba590289a9cabbe3ba8e2d46152e632e3e
Key Image
ca3400f0be699319dac39c46705788498ef17158867e704d3a1d2cb10800ee6f
Pseudo Output
30da512f23c833094991a52c17129632541f55148e57d8bd81161dcd6696b142
Key Image
dcbf3e8e525b291f2f5fc02658c64f641d3655e706b2da915a09d7f7d886703a
Pseudo Output
e0520c08f6feefd83f182e57819fb257df60e2c6509ce2ec2aba031955c6f566
Key Image
20080d450c013832acdb5b971357f42b01d20e462b7d6e8a6bc914a7ab11d85c
Pseudo Output
3825e421145db3d32948a95323ab84680b5cf5810cd4a5cb15a2ce982305e869
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1e4ff636e67d2dc65efe2aeeee5ce05ad09b7f03665096f9e7e94fa2ab9ba22e
Commitment
5c527d8d6a882b35fd60b0ef13ee7444175635cc1f27ce86377d2cbf278f9912
Range Proof
672 bytes (Bulletproof)
Memo
e99e15edfe9344cb4cb64090eea6724d57edebfd898b680ef53529e9be1563b80ad683d20f5d04691e9c8b6dcfd08df4a64f6f79ac936897e26b425edd33db9e790541f5803de5a3e7c2a0e5238b4bc0e547d0dfcb5f9d9a9df7cfec26dd93b2e32798a0cc3ed7e42518b26e4add5a027dadd18b51f11e66ed87e0f840bf930f (encrypted)
Stealth Address
fe0fcdbc02cbbc856ab8f1677cfd36595bcf71c155c87951d5662c2bd495ce2b
Commitment
0028e1686c055e5069123e3a06dd11c279c0a93a750623cb244f0aab4fff7072
Range Proof
672 bytes (Bulletproof)
Memo
fdaf72c99dd6898ef4012eebde7489a63f816131b7e0ca6fc0c03cac8dd0746f9ac1a37174ea5475731685c9b4091bbc8d6c100ee466006a29563b573755795f070f4cdd76db20ada6c1c91159371467c0428e57fa2a1bea416faa5c79277848610225cf5556173a01938824ff574be183a845de78a4da85bda13d70f846617a (encrypted)