# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
28740e809ca7e9dda129ae913d6dc22eff0d456ca08b09a27f34987500f3b347
Pseudo Output
9ead92f325679a036c4b2a3a8c20f4fd1f3245d2131a6f462b00d2814cf0fa56
Key Image
f67b626d4f44aca9aff80c6577f6741d0ea6fc172e3127786716bf90cbdf8935
Pseudo Output
b06b8dd7e070ea2123015699d86d18e5a9d0253005f0858fcafbd8abd2cbfe03
Key Image
0c58109ce67939d7221baf41068c195f6b07560f1dac193a69f34467fe71b020
Pseudo Output
b2cf156e2d1f4ee00cf28dbdc2a84e01062fbd4438a73fe39911283c00d21807
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
16c7dd2c6c76d35d2cf10092132a5b9b921ba91fcbe2883c47aac67caea4aa6f
Commitment
f6c1f13a47b5f05857b6a9926a66b4e7976397f7401b91a755a6d36b4921a946
Range Proof
672 bytes (Bulletproof)
Memo
872305d090aceb838033e15f77a906537ea07ad9d8e1e13f6d23798a3ff7d08872fc4507ed1836aa5e918e50ad60b227ccf426ed9ce7ee74b5df5a37dacdfdd274526b9b0bbcda6784c93a58c0143a89a8adba6bbb5b51c18dc7f7c2a10ee24d1fb83578c9b8acf94a382d04f1a81f19b683cfd336e2bb4802bf0ef8c210e47d (encrypted)
Stealth Address
32029bc2607df459a76c07af52ed5921d859a26f5c6877cdc84cf8d4089e3d38
Commitment
a2ef72e21f7bde301b9c92c91e8810126fbadac9856f765ca5418b2cbe493c77
Range Proof
672 bytes (Bulletproof)
Memo
38f115be51b037efe6c61ea74d5233ee281fd12dd65ece252349b5d2ca013950ca83fae260ecce348e355cbffd84c93544e83e692ec7a8d624e26492f69761948c0b818b9e4b559f7ad964b67778b7abd6b5d04909e4953156a401ed10d6b286a0fcd7de992024d6d9e14abb7d2d26290aaadeae909d848379969cda8b44fea5 (encrypted)