# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
38dca149067134c33556ee88529b0b011abb21d7cedd966d9e3fab8ac0b6fb27
Pseudo Output
f6cf4dd149e0c4c75ec1d8241cce472ec5de652defc7327f09ab5d95d7dedb1f
Key Image
4e08bc73e6cf0c63fafaa6d17115d38a19aea8010dfa3b240b235362f22d5e3a
Pseudo Output
cc0111c69d5bc9f522f27c4da606756a7db5d0f26dcc82edc802868994d2a25e
Key Image
dca75fd8a19822d37898c496f5a752532c602be4a6cc594f3dcc904b79d5cf31
Pseudo Output
9a0c68964c41ec6a8efb7bed9f5aa766953a42c006f15ba917f919a2fc750b16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
16af7516868dcd6f59cc48a22ddd4fbf35d4f3c908c561d084927c7a07e01b4e
Commitment
ca7aea13a95aeecb526e8f2d15cd08a5c500e25f955ac90af7011fec3875363d
Range Proof
672 bytes (Bulletproof)
Memo
ba01c9133689449a41c21eaf8d8fed1e45c25d42d6392e31fc27873755ebf68b8482978c0d6501f9c5068d79a76eee37f65e3d87b312814d0795b68cb64ac1ade7e64a12aeb2e165799b4cc4763dc01b1dee8d74cde60c3bba3324d64ff3520f2f927ca390cb1335ac26e1ce12f8f65971a21532f581bd8aa5f2f1814356a3b4 (encrypted)
Stealth Address
ce9ba25dc2906a8fc884f1f2dd1a6c27815faabacde0f8ac7014dd08127eb17d
Commitment
4c0da54091acf384ff6ff639350e96392a9aade74f42e7663eaece0f30e2ba25
Range Proof
672 bytes (Bulletproof)
Memo
a3022ab11f880ab1fac144413adb3c144a8f281da66c77eb78f7af66c40c621880a6c5d3e95ef6a266c1c9c7a6b50cb44579df859f34270ac70b7e281225fbb46bd713c803b9bc4acef842636d5f0f5081ab1298f6ffc5718b94362eb32e4a5951e2ea38cf9f96958c2c486c4df6f9de4210f825f1c10710e3ad43723d98c38d (encrypted)