# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e4b11f4f871f2da9db17b83871b1856135cd880f67573aa237d9a1157b85f53c
Pseudo Output
349531bb8dc015d01defad454ff2287f87198a28d7fec3d3e8e8ecf851b8b92e
Key Image
6aca4c7dc999b59c2441b5cca6bb5ca32fb0d7107c51fe4775c4b03701613206
Pseudo Output
1420d6f3787afc4ad7250c7e34017c8d728597ad75d07fa700982897b3393a3d
Key Image
8222443a5cff5dedf6465d96914b54c47c60b24ff6fe4cb35dd97a7a05adc724
Pseudo Output
c0164ae38e073e4cf8b93f488573b967b189119764ae9dbcf5b61ec9f0f47d69
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f89f6def8d556238b52d495ce26f163bce06e366f6cc42dfc5250121d1418e75
Commitment
fc6e40aa16b718ca3ba6cf7f9fd8e9cc63ab42c56bad60d8e0b1c9baf7d1eb67
Range Proof
672 bytes (Bulletproof)
Memo
7c4e19693e498a8ce93d1012c56a7556fe770d8051a2f93b2f2f5d3b76bdb28b081cb0184c924b13eb690ee89813c6b2d181a21b10ee71d7c64c5effc2d08849e24a39584b99c6d6a08eb053dcbe62da8514f47c7e13089fc2f9413367f9b0ef7c90b06383821dfe31166469d17fb317af919a82f7ed0d93cb23fe395c3b17b6 (encrypted)
Stealth Address
2a12e76c40b4a47cc3f431d69fa93a29139223a96fc236c58ca3cf15fc06243d
Commitment
ccbe4afd8d345ade865ad9470de2f5e8882291506b414fceff41fbc6d5cbd152
Range Proof
672 bytes (Bulletproof)
Memo
6afef5262c7d24082cd6c00bfbccc74dfe50d3fbdd20e5c4e60289759f000894ed2003b1b83d123c3e0f6848be5163d40ab2aa7822dc968040dc6ddf09fafe12132c36204b613f73e5fcfde2902fdf03547047836a42c670aeb9ff3910a94220fdbd54d3a12f99e772a8469cba0a110b590bb1bc1c924cdb4616a7a0d32901b2 (encrypted)