# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7824bcbd2905e31cc94efd1c123ae64d1fb423733e4b1381f268fc454e6ced08
Pseudo Output
a4090f75a83c4124b18566bd2e784d93feac07fbfcd88bf1650872426526b06e
Key Image
3865263843ebd91d7e62ad4dc9517cc68a7e953f6a9ec945106ace934addd319
Pseudo Output
12208b46b606518e63597373b855e2e1a95c9f18c1a71486e86bf4c31f5dd024
Key Image
84dc6943d496c3ff84213203804ea124c4beeb7533f90c64129fb39883cf357a
Pseudo Output
24087e785e3cf383d15091cc9b1fdf0c446908e1338a98b617bf79d7e29eda0a
Key Image
1ec939753e4ba11cf74de29dceba7c65159dd7e6735b9c6c66cfeb964c18ef1d
Pseudo Output
f26fabc3a81dd7c7bea3bcf935be2881231107ef5620a9d44c66930ae68c9f08
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
763b606a0b7879c375374ea34eb9918b60b868ad4c8ebc508850b57580834936
Commitment
a4fcc9b9568935d54196f2b92ee6a408c30508e89b43b9da62de77d748419075
Range Proof
672 bytes (Bulletproof)
Memo
2ca2a251fdaf157a5d0ee74b4d07e71e6618abc4cc9d1574867f4a5f619f674c233a44de93bfd9c038f3e5b83d9e7f979f6d26acd1880b9a9f907306dbacae70e25f74ac06bc799b91a1e1c9d7161d6e6e91ef27e9e8108811d4bc15ef52864810cc8f87b60a8582c5b007d56088cb8b2b1755799a6d1c514a28dbe4cc87c22e (encrypted)
Stealth Address
a4bd56ea2ca655cac1645dc2c7c7da17fb12fefda4e29abe8d4098902fc30629
Commitment
2c75a44419ea2206c0b8917560e93aa73991e2af12d3e2a1842392bd913f0431
Range Proof
672 bytes (Bulletproof)
Memo
8df8a1d49a58823a0adaac28176e3800b309bdf14cfebf00866b63266100d88276acec4f88fb958dc798aedfd21c818eac0be9d724f1f8eeca7b44b5e2209d0487dfbb6b3864d33041ba4676b45cfb3a0ecc5cd4e1526bcc39018f6df7323cc237771cb434d84670cb4cd83ca08e46e6299926df7bdd2b45f51e545b53a01e0b (encrypted)