# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
12a2f07a85e1285e782487741afb9430696b04e6f86d8daa3b2545d907428831
Pseudo Output
505337b8e8edb1e27cea9d05c30ab913d95099a7a270c70b75c5ecf4d628276e
Key Image
d0ffe6d9b158d5b76ec1b7170794381cfb35e3e041830fb8f953a52fb36d5008
Pseudo Output
6aa0444d92cb40ab7b047220194c15647f6796dafaf9355109c63e54e4c21b42
Key Image
aec8de2d988bd83b5c8ef744fad421922aac0ec41d39ed49acd361e346c24254
Pseudo Output
bc045ff93b0b0077e7599ce5daba0fdf424752bb17956edd710269d00260232f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
54533f7954706601c011da62957266aae4ba7a8a94b4707acce2054d4c630331
Commitment
4cac321c8d3200de6e90ab527710b793d8bf9ee505e7735b09bc9963460a035c
Range Proof
672 bytes (Bulletproof)
Memo
899bde5f0fd8a9ea5987d9c9327ac71c5a6ff031b847b24d092122ca877cae3f27b3608b97044ae4e55daa595de300b4a076d1347aad476092e6bd99fee611573641d0ad367bc01d7f8b1ee2b8c4ebab39c70c7adcfe368225b63d3bec004c89a01ef7e6da2f6d41f33fb1a51a1d3642801854971317154543b92cf92eb62192 (encrypted)
Stealth Address
8e3cae28c4d369d26281dbe10ee51f4fad711c00b56f1a0e7873a0f2d4f08f6c
Commitment
26583a9519946c18e6290fcb720405ef5839f853844ef8f2801857729646440c
Range Proof
672 bytes (Bulletproof)
Memo
db430116126244bfdf216e5dfbe59f0c4dd6bbc055cd5ecdeba4e7bd875dd43c4bac0bfbc77fbf05daeb6cbcee0135412bd0207052b655b7747c4a2f83526f82ef9ca13c6b65f3c552d431549f691b140efb08bc5987bcebdca0e6c4ff8c48c0514b879f7e1903c58054c424842efe8e18f291f19f3410855232a1f318cf69fb (encrypted)