# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
18b2a364ac7dee3ea63b2da4f0843b54243b10cd2eea2152ce040b66ffdce929
Pseudo Output
4c8b99f74d0da78594a2b88d88a4054db7227bb4ec3c8a4126acaaf76468b11d
Key Image
38251ddd9bae6e6fdde111ff987e0b6c30182e521934a9a0500602022766353b
Pseudo Output
caeca3c8ff222befb685eafa3a614e6a2bc203537f81cc4a44cb1d546599695d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0ca3288bd4f482ad8567af4ee738db82e915d59a1ec45d612a717f19d1fe0b13
Commitment
5241331f7539667554701661cffd607838bd09a16fcf46da7b84b607c16ff23d
Range Proof
672 bytes (Bulletproof)
Memo
530a66839cb190cee7d2b89aad8351d5d3b891d8627c62e621f177c7341bdada39a1625d13f5aae83a78939cfa8d4e885b88120c5762cdec6ddfe7d8a9569e6b03c97afa905256be6c363da7048c71c1d4d730452892c9b2d79723b7c5b97094b04debb32860077a056974044a15a504ef93253e698f222f009d1fd93320c5a3 (encrypted)
Stealth Address
481fdbf450781126afbb174464e30bd9b182847e75be77c404ad584a415c1135
Commitment
2865a1c9bcd02b18962c1f20a22029ff2f1233de7ce07a2769ea2778fed82924
Range Proof
672 bytes (Bulletproof)
Memo
7fb88688f52a21cfbd74a9d969d87486dd9d07bf8af182a98b881ad29bd1dff7321beff67ea5861020837657f1fe826e533aa5259161bf7e13432ae1c02563a419eaa44a2b485cffc84f84da4bab8fd917552dab3ea3f443acb88bc01c70f809ac104c1f46a783d14122d3cbda5a64354a7148352fec966da32026348b1b837c (encrypted)