# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bcaf856ee0a86e75f1e70ea4931ff706d4de02beb2f14dff745aac4f2b4a2525
Pseudo Output
9a7b16f083c2b711de0082662bcc769b2b3de4ffda00aeba6d69e70a3422b252
Key Image
fc42921f1dd0bd56587a68a4f8a3325eef25913a1ca7f582c37a37ea28b5725d
Pseudo Output
b884218ab5785d447b8c675970a70405442926acb0aaacb4a4fb795bbfbccc71
Key Image
9a3e8e9405207a42bf11d69acd51fba24d25f96e97c7571342a5b90c3cb0423f
Pseudo Output
6c22619f30c48a0a1d0051a5478276946886383f6a2f84f89a533349c7cff548
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a664e964e0d6773bcc211391105dd6f5229f5215a3fc5a34561ebb8b55877165
Commitment
bc3b0c7b45f0977b9ccf53f1233031d8a0f1b7489e972af2d4a715bf16eb4714
Range Proof
672 bytes (Bulletproof)
Memo
92fa95226dc3c1d7c2fc7de950732b5bf6b3675d031765dd1b19da42ff774b978980dc3c715692104fc70a232804d1250617a7b7ff3e05d52ba815f52cfcfb75d7b1c741ea667588fad06a3a9f3618f630abbf9b215fe769f7bb12d7faee56ebc6b61583e78ab422d2ddfe7c35d5287296716342945645c5bf8339624b80b478 (encrypted)
Stealth Address
821c02417897a65c22841ab3c7a6f72c4c269b765c21c51438a8b42812778b70
Commitment
dca51295ff151670fe9acc070b791f4c5e1ad980f28e8a3b30d1a2ef7f28f763
Range Proof
672 bytes (Bulletproof)
Memo
9a81301cdcd7eab08d709e0a205b674fd274b9ea1b17717b80cd2332f6c34d5d7f0337bdc756a9a97328dc17694dac43eec25827ed23ef03171f26097d317cc13f76b74fb80be5a396d934aa9c2aab341187adcbb355e3b43f4cfacb0f8ad31e3fc3a3a7cb4655dd8a3cc20248daa9b60a12cb459499c2ff2c40aed8b68d10dd (encrypted)