# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
28baa3a33ef53eeb5880bc124776d6dd6c991688ffbafb2453a0fdb44abd8632
Pseudo Output
a63a043d90c774bc93255e20a70e2cd06fb83cecd7cd8c6414b67a1a99629049
Key Image
7ccdaf2ff929a70df5abb6939f7a36d1f02d56995b3d5067b109f9522e3d034a
Pseudo Output
5ac1442d174a4a2c03f70b627d07608e4b4b75304fc71e45e289ad04e94df34e
Key Image
70180e2641b76d8a8597aeb7dab753116798e20ebc770c603186c1ffa76f777d
Pseudo Output
6a0982a5367b10ef0b707be56b8e446beb68afb02c2130f84d0396363b96b45c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52c7fac46091da1a81d3eca73a0331876340d23a56fdef72fda750239963be7d
Commitment
18466750c2e0f87b28f8eba57fb68f671bb25c01baf4b624ee7748b8ea972a15
Range Proof
672 bytes (Bulletproof)
Memo
88ef17f01aa0e903e266905d5c50c1797db770a92fc9e36da9bcd8a15d9767cf4da06149d00f41090baeabe49ffaee8065b60a3c491fd1a18ff7c971a8f1963646a37509f98b9a4f8a0d0c90f39ff4c90bd7108e86e7b98257847ddcf2f490d6871830dcfda578f04dea0bfb7cd6ed9f2f7d27ae2e01d0f89737960788ddf873 (encrypted)
Stealth Address
440468e4ccb644edb3e594e5a0a1ebf2aa60b245fb57c47d12c3ca3d12ea0b65
Commitment
0004694928fb15a7a046e9997454a3910e74abbde1b2b686002b2ce3b8fbfa03
Range Proof
672 bytes (Bulletproof)
Memo
2eb07a20da266a22f5489bb0269c2cf97425e957b9cf9c7de3c8ee1c15295280403b2b09ef7050488bf0d614850464baf19260f329bfd2d881b00d10d4c6a52b3b4b405f48bb1a672850acfe42c2b408617018419ea8b19ed6d8dfba09c54c36c98cfa0948de3926b23885eb58b862320b70a6ab5ffa9d3eb42b601febbeb3a6 (encrypted)