# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ee901bae3e69434a8a1a47e3b5b420497f6b3cfbc67c6beadd551e3acc1fa36
Pseudo Output
001ad430607574268173ad2610131042378809a0be821f3e72d78b13cbf16b00
Key Image
666362c5441b5dec13215e23aca764d8fb7bf8b3e7eb8b4b12d1ec368b5e0d1a
Pseudo Output
200123c0820fd97abde9a8e6f94a9b85782121a4bb8d939a8a02654d7e64017b
Key Image
32ebd12ab182b97eb354d656010149cb755f0d918d5b01f534203dd38d457751
Pseudo Output
b82bb9895a55770f8f2ad64216d48da2077351236def4ee7ccf8f85758047e72
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e85abfb18ab2b3ab84b8cffd3fb3cbc2f5a800c0cdad02c50b54e77526f8ee73
Commitment
3e5d77170dfb6ec815288808b73559205172db3501f2fab860dcfc70a80d2274
Range Proof
672 bytes (Bulletproof)
Memo
8a5154cbb5d2241573de7467702a72ced7cdba783bedf284bf8b1eb57d39e531b2458ed5793fb8cb3ad6ad1997de7f94b90b2f0e75925a75d818e902aa1324b90e5a8744855840282b0105cedc5214ac1bae1a1ba6f6f15d79a6845b8bf0da24dfe43aa67591f1994109055c46c305cc5232abe72642fae0c62920b53e3cd244 (encrypted)
Stealth Address
de79964ffc23fa4a6a7276d73bfe838ef8a74d96171bbfa61fd4b2c31a5e517f
Commitment
14496d83603e0af62bdf2f0889b558a1abab64263b4a319026a575227f897362
Range Proof
672 bytes (Bulletproof)
Memo
a111a55e92462103a6700d448330a4d26ea3cfe489b6bfce9bdec5853d3210e5a0d35439c2ade7fc97c40a69d53e0da23bf4a17dd77366fa577fc0bdf4d1a68c35d6e5ce65b23445efb90c10391c81a0ecfd8e084271c4117030ca2d22e63d7cd3349ca4872765aa45e23cbcd9a86ed0fa86d1aebac68b0f3b388e647c5b89c0 (encrypted)