# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3e67dc51a370eb885a8a9007059e1a0bf77fefa90201cbefd52f9ee7a920642a
Pseudo Output
2486e88384345af8ed2ff95e3cefebf9ec046c9c4104002804550f126c8e2f4f
Key Image
8e280edb5fc6b4a7e988154400ead3412450ae74c6a6697f01f1b16197fc833b
Pseudo Output
c034deff6077d6711a2abb091a3266af7977b3409515fa50501ab03ba1e97321
Key Image
ce599f345e1f8dbf387b888cc92da5c0195b2d924c73cd8c3a4564b855e29c1e
Pseudo Output
6c595c10b3abdadb4322499c4dadfb153af56b41206ba35f3c8c00d0d1e3393a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
302b109a7f7e8c4104075475e97a18b5f85e4ab0144c40ecd3d2216d0ea4610b
Commitment
1c59140e35ffbfdb5efa272f89e8487f2971ca60a6c9fedcb7a6cb2214eec05b
Range Proof
672 bytes (Bulletproof)
Memo
a037bf58c67639ed2002e04664252f3a172dae0ec15216c0bc5ff1e5c30477d65d211272947786d1b97ab42d1b25a2a9f4fb30a30e65a6f415911dc338200695b9f19e3e4b60d0e4964c349c7af2d0d766c6939a364c14df7a9005b0c5d94e45e71788e4b08da53c0c33be4d73a7a1831c1722d80b2c6a9d9c0d785c32e0bdb1 (encrypted)
Stealth Address
a4d41920fcd188ee4c5129f1ca1b3b2a69b9a4f1b26e440be7f246efd6222831
Commitment
8eb170d5708449d4198eb093b9f213d175a032c60e36609137c76b37ce747627
Range Proof
672 bytes (Bulletproof)
Memo
bc146c5ab66405a1ec27e03fb10c59b6628fe085f6791fc8619b232c11e88e57e92151f9a896eb6912ef4dd40c05edc4b6f0ec7569d0c2b759a393d726764099d55c753e3d814031db7015d391f03f8c629515ec92b6d488a62a7a7c748f7cb157abf42e8d323186231dd19aa4595c08aece4a63828c93ae899a294fae14d9e8 (encrypted)