# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5e23f8b995d307b6e772d5848dac67908ad14da71317d755f50bfd03a53efb6b
Pseudo Output
a6d6a6c2062f9bf01b9906d1226511fc2bf944bba666f53731a3c0d66b70776d
Key Image
42533d616b281c62dac8d80a4657a165261861dc2fa5b15a48605405bc782b43
Pseudo Output
d2fc03f2931c476f472ade31f221a3c583b8fc55555cc1fabef5db8911f76c17
Key Image
8af2a4516ed4a95a0dde431ffeef7f7337ad88f31f3fef24a082e2198d945f75
Pseudo Output
28265214135b14b28752cb6501352d2f0ab7746579d2ecde7ab449f0a1f51d4b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
28858061d2d90702ad92a32da83a72a18bcb1698652c57a53aaecb958bc7d26f
Commitment
76f8f85b153d3dab89be7da397f8b1571bfb03a421c8479b80243f83614fd20b
Range Proof
672 bytes (Bulletproof)
Memo
01a0129cd5d0ba35d2c16fd272b1976eb4ca87cc37a2c6b0983a5b9227ef46198e8f639d2d0d3cdc650f47dc50b640ed89f66ddff4d62ec48dc99b624fc98113568587d8cd3149e716963d2eb012e62ea85f3e70a5b0b1e12596595e7cb4333f262839d5ece12b9232b0c34f981264a601d87192b10fe2e6059dc59b91693249 (encrypted)
Stealth Address
1a203e238d6b7fa0651fcd5b225751b5924c80391c1f7ff4bd3fc2ec9584d635
Commitment
d8f9654ce988ed4337af5d8d6f8a86780ad47337a5e996eb9a84507d9a424a46
Range Proof
672 bytes (Bulletproof)
Memo
36998c9569209b0142e1bb27f1bf53faa527d818c19641ae3f1756f6d6fe4f68c374a9b573a7cfd6b16685c2fff8a2358ce26c269b60c014ceda96a160ecd85cf245708c2743ea8780c7259ab29ed64bd33904c24f9085b3506967e48ec006931fce326a5b3709e379d6603fb35b6b2b158abbd49fea806379c30b3e3ab888a7 (encrypted)