# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a60d832e6a5af5a0c97b33086e79187a78d7945dcbb053f6d582b43314b6ca47
Pseudo Output
48f4e8cbac0b0b443b88fd6b40d120f3ac8fdf2fc14e2d331991e64662b51940
Key Image
4406314994de20bbe8f1cbf74936b97b6123001dc657c9aaee86460043cbc62a
Pseudo Output
becd85cc6ee2a9ecab4a0a79e89253fca30f0c31b99e79e9c07fc7681eed7b02
Key Image
688a3c91ddfe81e7f80f0f678769143ee05ae43e0a58d5c487d56e83dbbcf057
Pseudo Output
7c251eb9ef338d4c8d86f085800842b9744ee5ef674024be75278557e5fa8573
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
eaca87b08a6d820e76eb06010544ca79915df108ebc25181ea54a9541713fc5c
Commitment
7e4307f4758803b790725c7abfbd766056db5996bdef74b16504583a98274c7c
Range Proof
672 bytes (Bulletproof)
Memo
1bde70a45e7efb45b2a589446c8c4c23b6862616e1c0f670450c00a648ae1b17deafaa4957c2aec719294990ad37e231088fdb7933612d8f73c6c03892c42139917c25f20d955e508f868bb2537a092e793d3b7481dc656c56ae9a68b161617fa9667d1202f0214c6e68ddb50529b9556d50824a3051c551a0e5f47b88f84e70 (encrypted)
Stealth Address
a09365ecd6b9ddf29be407c384228f8864ff0a2356dc3ae2047e155db5092143
Commitment
e4302d42acc338527414dd4238a7260cc005a2a1ec736ff93e8affe5e058584b
Range Proof
672 bytes (Bulletproof)
Memo
e319a498ea57692063f7bd8ab95909f780ba105a09ef1a3af8e535ea07bfa1f98042c52cf42a31ae35df602d50202f22c267d0bbf9680125674ac58e7bac565a022f4ca55b56399af437f9e382d46c2e95b8bbda8f3d7a26c45c9be3d2779457ddd7eff3b4b6e8977c1e3b7267681755ec1320b398d54d17d83ff249361b1a78 (encrypted)