# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
220e1fbb0b551e64ec2af1d36b5ff337bbab5c0bdbb41edda0ae113fbc8f0f04
Pseudo Output
489fecdbd73aba152db8f01e73740101237e3a5933ba4bbff71917a80c130036
Key Image
c6f5f15f8db9b5ab63363394fab9149f82b3281e41eef9833d34b344b91a6f3a
Pseudo Output
48ac04bb5ba903b0fef76048e679f5dbed08d9976ec5b539da8461b985908e18
Key Image
c0ce7604bed5cc9f11af29b931b93361a191d839ba874ae737c41988a8fefb3a
Pseudo Output
c01fd62759d3c446f1d9e42cdaecf0f126d955fdb5531160a70ba77ecf654307
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
663c32e38993c35bf962468d467da43559bfeb861ace882874bf2ed689c4a15c
Commitment
22cc50d91f7cb1b66e4c4a10d3f622d50f767ff262ddb1792626cd163dc0100f
Range Proof
672 bytes (Bulletproof)
Memo
cbb11e11cd1479f1460ac083afb6fcf5476e60a154c4f83d0908abbb9f8424a1985ed0f9058a3b7b52b6ee94fe0aa5839d51f3b53e79758570da960b78cc5ccbf193290e0bbf189771420df17caa7721e2914ec1f9c12ae7067004fb59910e96ce3f23ccdc21516c9553df9a6b2c20e6cea1c826cba4f017f9e06befa81f1627 (encrypted)
Stealth Address
b62da82e5834d5d87f2f0da33048841c1b5e0ade4af6d0879b502fa9d6dc992f
Commitment
4ae39f585f8761098dbb483f3444127cb8c0912408cc4f38aa768a67458e4f29
Range Proof
672 bytes (Bulletproof)
Memo
247f26897d0b6f1c8ae6cd0876b440ba582686806e969f3301a43eff752162b480aaedd67309d42bcd716fa1928f83057bcaa825a79d588f0c48930fd8bbd135fe49cb6fd58a2b0d7a7d05c1af82f575702e27f23cfa0619a360d042e13e56f9d8e2f56d3c79f795a00b75cc46b264d61bb4d1d8e2fa0cccb3186fdad424ad5f (encrypted)