# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f881df0867935a92ecdef03719a4322c91c9063351a3450641e6ef4534ce676f
Pseudo Output
8ed7342d3762a085cad89286482dec24748ad8a8c10ad6d7b58195ee0693e72c
Key Image
8e591f2dd17cdb99d0908d2ca8c9259720a30d1c8f63a3d344d28d7f2d9fa47c
Pseudo Output
7e8d1302d8cf63e491b9d3462fef61c79c1ce827834c8ebd9fa8d36ac5dfc636
Key Image
4453eccf6a957193226de4ec0e158d50022e16c8360337eb4ba7e5f4181a7d5d
Pseudo Output
b42188caac4f8a305c38cbdef29ee4821d35fa10d0fcb2c0a1fcb50cdf7bcc16
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1088a040f85694209eea26fb2c662ecb648d7ea04b148136f8f135eb86d04d71
Commitment
72db1af1e97d1104851a8179a9eecb9c3a017cca71dcabb99340b1549f49b947
Range Proof
672 bytes (Bulletproof)
Memo
b5dece906d0bd2b909a50558899c3695f4bfdf2d311b6ecfe939b18ccbfa8457cf3386d62d84c2649ec7bb12ace3fed5e67694888ae86ec96a186fb3aa45eee270b818c698107ec5ab85d76f49b6d362a7c46dd16ca4769d7275344898918f01847df6f1fab7c15a9bd36cad69d6db833bfab018a6e0eb68840559850e446cd5 (encrypted)
Stealth Address
f8abc1a14b69956507afe64fb440eeda524039083e92e4e1aaf2991620602b0e
Commitment
98001d3984b63f53f96bd6b109c5a30f05dbf04274ae44d2061cedb3b91ed37f
Range Proof
672 bytes (Bulletproof)
Memo
1dab709357073e5289cbbddfbdb455383d0c1509747265e3a60900e3b2ed8e2efbf7ad3d3e202151faec30cc4868658be4cb1c430130a0cc147ae0e844d51fb89febb89abed19054144667120aee1b39f51662df810bade8093f4afdee57d6c5519b167c285a9d5cc86b07a3cda3efe288a20aaa53b38623b81215ff31bcac40 (encrypted)