# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08a060d263e0e78a2e2e09e6467dc8f074da59e590aea08d2e8dd0c08f86682e
Pseudo Output
643da29db1e1c16b19de48631aa54b71f227f22cbde41418581b95724bceb06e
Key Image
e6e9d394426433a97c734472f025e245e8ba2abd51304eae2710f3a92ae4b73b
Pseudo Output
6c78a53c3d03730ff9b455ce62ff1da06873f178f3d49d4658ef12e52c94712b
Key Image
c8643d49fb0212acf6dab4e6038ee841d64a52235822e4faacaae30b8a6c6f03
Pseudo Output
58e2432587ed063511165dd8dc9b246115ea25a300694e1e581756d88307dd78
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d0c588444c0d9ddb9eb4043b04444e626191dfac1ae2bbf8dfba46cd2243eb02
Commitment
4aebbc2b0dfae2ec35412dc74d9c3703b308168f5f94f51dc47f125439f88a50
Range Proof
672 bytes (Bulletproof)
Memo
446abfd1c87e761b27fcb55761efc2f8ba9ea7dfb2d97a93eab80dcb28e98f8ddb89be16397d65bfd44a15575e67c35d7fba42bca12c718cb5858b3fc59f26335284698dd5ad205f35c90e35ec00cb0bcd45e5c122d5ca67504fa97facc3130ea5c5781e1ae98ddd106a9d3c076541b392258ce72caddf497e3d3cec0533aec3 (encrypted)
Stealth Address
caa95812895a3e95b0e168d2bb1772b30003c5c7c497007774caab51622f0957
Commitment
905a7cc8bf77a827567fa538905a19b13f192aac81839e608c650a851b7be03a
Range Proof
672 bytes (Bulletproof)
Memo
c45fa066cd1f4bcdfbc19427f9111d061ed2aef5f5da8b7e10288d04b5a377c94d795e670f60433156cc53a818ec20771a2f1c144982cd690210cea26eb04afab18eca9a896fb50f3c0ade6d34ff6ea966972531e9b318f1c5cce602cdc4ed9efca27bd15f2f5973804ac7a1f96e0d0105735e7d1596dc6f5b52927b3e7b40d5 (encrypted)