# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe3abfb0bece8a6bd328918dd5fc5d9ddd5a3b5671c98f9dbec3250ef34ad244
Pseudo Output
aee3ea7c723708286a0da64430b3aad2ecf9d7508bc72e902549532429942248
Key Image
9e904ea227749999958f2d9212b3c05361b963fc2f5003e967498506bef04157
Pseudo Output
78a4bf2160e63c82365ec419099dd238cb59d4454ef1b46a83c1fe4911eedc07
Key Image
5a5d7bbb6530e18564a7fc4e62a5bb6d2ce7ae2429d643811b0e5f6a1bf30b61
Pseudo Output
18b947954f13fb9de8679c55f4d652fa058bd0eb2b289a5815cd2bd7dee21404
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5e947bdc71269809e7862584703a1f5b86a20e7af32b49b516cac647868b3c4e
Commitment
d07d69657c170459f35b681c8405c5b4a80d76eb1909462b1533eddec058fa32
Range Proof
672 bytes (Bulletproof)
Memo
d7179da9c8f11d7fc09c6b6e5126be7e1e0270d889c643bd32b9ccf9afff121ac9040b1d5d148dde967c5359f640a8eac864c2fbc2186d32671956f48c377abb655449990b0a4d0afb4f5ede5d7f4f7ec256c0a667994c18a9f695eceb1eef0f6a3595e8c6206248d4a70316b909666fab9be92f85ff2bce63efc382ef6de293 (encrypted)
Stealth Address
bc3fb5a3cc29d55530af79a72ac9eb9827441b804fd37ebd10001d38d43de13f
Commitment
ee8257d1302495d8aa45932f9bd4ad5a8d05c95748d85091471dbac6af843664
Range Proof
672 bytes (Bulletproof)
Memo
85f428dddb89c2f619d7c03c4e08209880d5ea15a874704452f0984b3b3335021720597df6df93018402085063437149a575d09789262ba8b1bfa4db8524199c296d8479b70fb4edb298ae9948d24de13554bf61c1436955c3dba4b0b76d32c71f2d7241bbff4398ac0cabb59f506e82c34670b2746e0fb806622a42e6460ae9 (encrypted)