# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
6ca3c2c4165bfdb018603c6ecf4f350de4bd73fbfb40ed549d1cc501a1737303
Pseudo Output
6ee2281e31054b0c9ce0a134110319e44c8d6224c746c48476b338521e593e02
Key Image
aec34dadf70ac67c2d8a73abfa981964c722561ca91971d859866c681404d554
Pseudo Output
5e4782bc6fe11c1da3f8731c68b869413a044383a14a61da68332ee6c2f89c35
Key Image
0028ceb17a6a55de8b101f28f18902521cb3bad48d031ff0c5f4efec743f7124
Pseudo Output
2a6be30198e6b6a4dfef84667a108901192dc94c6bd68ee69b72ff29a1a9287c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1642c57851438436f8401dfb4230def19a5782dc2c279663ac05e3774f9e6826
Commitment
4a783d71cd9ca24bd1d0501ef6fa7eaa6f4a742a1540b46e145f6dba11b9ea28
Range Proof
672 bytes (Bulletproof)
Memo
7df90d8113e0c8a3622a177de475b00221ff8d13ba1a0685d29ea0a1278c34fd678b35cb93cffb36a19bbc1f74cf3aa19d6cba6503c98f48eeb1424c4e617bba3c1959b806bc0bdf4e63d8d638a28bc36ac069755e45eeb6cacc9b0a2859aa2ac726b7250e0850caecd56db6dad85a7873fe368198d72491fb20e3532f5295d4 (encrypted)
Stealth Address
b2fa451afa97c607257a8e1836169a929846d6323bf830fbb6952d83447d3604
Commitment
7ed6d45bbbce359ad0f76a094d44596d1bfc9c239438a330b88ecb46f7f2f227
Range Proof
672 bytes (Bulletproof)
Memo
a1ae3bac0f61a05c4086c295abfcecbd01fac949401e43ec5664135f67beb668dd0a0f7832640c2a0808dee6e7fc1eecb273a2be36e792951ba3620b75f8df8264442b19499695c024f35d38274f72db6aa06beb18d0529d72940c73142dd2daa3bfe4ac119a2ace0d3e5f2e270f7d77f96c2c0f475fbc645cbf2478e3e0eca8 (encrypted)