# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
802f2e6755732bcbad54cad392a695bf49423076d97284706293c00ba27c5a36
Pseudo Output
2036ee9827fdb1c73f8e20db684cf7067803480beedb92f69cd1b36227a96664
Key Image
6a6544c875fbc53d19cddabb6b04752e225a0d1e67c00f0bc86b126a63a0bc7b
Pseudo Output
1c12617669a7e36d54224dc7f4a2fe260b57a4e215a3fb9075522030a54c2c14
Key Image
785a00364a330e6145d6e82224dc3e011fe1d678fae3bd599c816b35f4e96553
Pseudo Output
129384e540091110f4d2795ea67219929534a0e8ea762aeb09b2f6c3d91fd92b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
78ac6e1be05f85dbd961dce35c380ec5588683344a20f27e48ce5023264a445e
Commitment
dad7b0b0b6dcc3172b6a3ae4fc65ccea8537302d68df73a2d508d102104ca22a
Range Proof
672 bytes (Bulletproof)
Memo
f729c35ddc026a6d2b114f7d2d5d80df86e55422ad1541ad835c828e931d17c66b42ce60af97562628e88e1a7e4144e790467610c9b334ef48d39c4efbac9496c03c24649bc0c5df63cfb49ea8b9d5afeaeceecf61fc5fa0552652990252c45e93af258f42b2447c0aa4b98d3e1e721537a4c678157ed3a1cbdd7018998f8fdd (encrypted)
Stealth Address
145f15650b6091841f8de911b4b4c3578017365ace135b584540ee8440226234
Commitment
e6a8f18fdda29ebd8e09359b3b4826be8753b1057639e0ff7140ec360035773f
Range Proof
672 bytes (Bulletproof)
Memo
a94cae878c3d4db4ebf7c01be44a31040f4b8f0610e1027a5770ea4ce08d9ed60362870ac87a53bddbd6e3d78de287d9df9fcd54486670aa48663835f28b601e27c274689d7d7ccdc5817c53585c36367f3d697bfb52a540c41f1121dc4b1884de1615c11612134f9954249cb4865517a901582ef414695eb7ee6e8eb2ac4edc (encrypted)