# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2000322dc529afdcc2f984155dc33319b4e701fbf74ccd280a29f619d5065708
Pseudo Output
4ebcdf1cbd16baf876df21448607d714e356ac6e9cb77660075aced1825d0032
Key Image
386f054f04c2301e81e72e0d246a5414d40c9cececfeb3381bfcf282ada84040
Pseudo Output
42a54d14fb5b26b25a353d0d5c1876606a3e88e13a5635739de80f71fb0a572e
Key Image
689a125d32d2e9f4b85a4f10bac94b9f48d281b68923ecdb8244855027c83e38
Pseudo Output
2aa87ee284435c9ec5076e2f2f322fcf61290251158a5d7e853ed803e484f165
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c2c674746b927a624e342db51a5ea748dbfb098ee0e408c344352de11b9b8f05
Commitment
e402cf734dcc8cd3cf3474a5a42f7a5003437c11a0cc1ca2483e30816743d736
Range Proof
672 bytes (Bulletproof)
Memo
212354e9b3d6e4802102494d86e373e114e616685c14225a14801409c7789cc6b53dfddc92ad7747560a38335ae8c46a424c17b99dc3579a8bd13e7b569b348615c7a0033450b11aea4809a8b447f1b525e732aea5b63fd96c13a3d93315aad9ee0c8c0dc70659fd86ac3d0188bab2ca886490c0bba3a2e427e7b1ddf5fa1e35 (encrypted)
Stealth Address
86f2b0859b8275f443f0697731c5d0780ab4a851d87ee699c498d1b49deb9b3c
Commitment
6c66a8bcf573a0f60a0d00b9ee716412d7c7bd7a5ec4bbfc51faee6e205ca207
Range Proof
672 bytes (Bulletproof)
Memo
db04b30be415ce7f0ba961ab5c600b78bef765316ddb3b7d3f5a510c216af4944008620784d1e952a6bebbe3d3a132dc4f2dc0c28863d03f794c6f9bfc2267be18dd746df43823e06e750a52076cf56c75a042a50053350971b7c3afa3f5c80de8b365c0bd364607596b5015a981e3dc29b7ba2e28d09c44f4ec21b5dc59f619 (encrypted)