# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec281cf839c06bf0b336d7855f98d9de9959804f38694e134222d63e7d20a228
Pseudo Output
ce0114d761401c4ce9eb3550c16ed984ddc183aae16c6dd4e0bdd9522ff00a14
Key Image
06a047efd526a6d990393df027d249f0816b594aac279e33ab4c79daefa9914d
Pseudo Output
50b9464d33d3d332146d6497c93c4803a5b80be9756a2578eb06ef34009eb735
Key Image
d458a37a55c760db44f58e788ab9ca957967773957e1b9d0f82989d9c4ec4017
Pseudo Output
3cc520100f5ddb3ee536c04a1a26681353254b4e515bf51a5de09a168cad946d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f2abc4402b8456fd1a2cc025e68e0b19c2494097fe02351874d6bc67ef0bc913
Commitment
4c94fe1463102b00d4126bfeeb31fe3a490c70576347c6696279caf5d5d2fb6a
Range Proof
672 bytes (Bulletproof)
Memo
c93005beb898eb3f1c79700570900728b44c792bbe2fc2232d9f7ea211b05bd9fa5d698668f3603eec9aadbae45e44193d0053d7184a08fe4efa7582ca8f7e63eda8fa7cf7081cff3853701c9f04b249d1a3b66679f59c3b0622fe078dfefe82ad5846d6ba821b2eaa5aa3dc49517526b3ae1affe490cbd429db9ad9736b705f (encrypted)
Stealth Address
0ea480927d88e26a1cf9c5f96c3464908c35d5c3e78fbfea38fc0586c1c20010
Commitment
c8e3df781be52091e9e1433dbfd6c41590041401db053d85686e9c81c124777f
Range Proof
672 bytes (Bulletproof)
Memo
657740a2c57aa70bdd2b795701d5338416ec858d3ec2b2830f0c5455bad2c641a0e4b577d15e3cdfe939b40c7771bde3f0d35c48e7f5deefd469f60f0da81a1e8a87f84df62d3b5775e778bcbef27e2ee1e3dfde20ee51a8d61f9d21188a277704dcb30deabc2686ca16d018a6b697d15fefa3a56a2ed7c46f5fbd463002ac87 (encrypted)