# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
72c01ec239f84e99c91a3c7d939f200f05960ad4c98d3fdf66e46258fef45a49
Pseudo Output
042cab1d8b6531861f3efc96639cf8450b4bfd68a17c2f5b04d22270d5191807
Key Image
8aae923de7179453ae35c1f7c91ead769d5117bd74d49981cc08c6607da4df31
Pseudo Output
426f0faf11fc18ba168726419c42eb328217b6fa7d9cff13db08f70a1a2c4411
Key Image
160ebe1668aa91a622256e805b0c3e7e8573aaf3b9db909c05c1fc9ea1da5f14
Pseudo Output
84576c8d6ca2f9fee23e448345b28a9fec664d1c2a2205e9cd03533f93b05c2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14f4f04c599c9191f90466037747015c4e766b435b30f86d9565b79450e7bc5d
Commitment
7cc0a206a8b86f50557417fe07b9a62e413cbebc091829e6634efdd1039be16b
Range Proof
672 bytes (Bulletproof)
Memo
d3dc1653890bbbc921ee6b5f9e60b0e6066e9ffecac0a265ba2ff9c809855646c25fc41822fd7f50add95c0e1146c90742215c8ee5bdd1f0ea4e568faea8f46d8dcf38b46641cc24491e31cbbbc1f8377fcc3405521e457e9f4f0268a825a5df959029ddf138d52a729b1b7860c11fb10e4e076bb482748beae4b604858b7727 (encrypted)
Stealth Address
9a87b75388f137074610c60279e6430a9c8b43650b21e3b77659c4f2e3d6cd48
Commitment
426681c789ccd7ad3178e9b23556805eda015759146e8051c09d68cbfd7f7559
Range Proof
672 bytes (Bulletproof)
Memo
7e1262ae94907ddbd8f98baacdd8424b06dd22cde4e292d6581727193670b07bb3cbf06b9ef3c510427a57d6b8c467d6826c3eb9544840f23e8d43b7e3263039e1454dda35d0768e88d71b8df1ef5e909fe24f1ced9ce1cd5b0c3af5dca1b39e54f9568f1cc9c1a57f3050cd441ca5c9e0027ca7ee18ce6072a55c6e34fd8842 (encrypted)