# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4a2f8a9143811eea83acb233dc6d32c9121ca20c04f40d4d98184dce52f4a25f
Pseudo Output
1697afaf01f4441eeca35c3fae850c5e9504bf2daa5da7403e4656aab5fcbb1b
Key Image
8c511758933aececdd7e7f59bf1d5a2ddf928b15df3d8fd1e11fb7ef132a0e59
Pseudo Output
300656169cee4b63ac0513e500790ae4ffe9bfb1b31014427b8a1729dc31db04
Key Image
885f74e24a2611270c698ce541871a9e4ae7fb436adff6d6adbffb30f32b362b
Pseudo Output
721c4a7604666187b967a942c05b7e6cb8e5b09cc0770f72b5d5528c79def601
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
82bb0ac55e3baba73905b2d6e1d35c39885220b882b5da98b053c63313a58168
Commitment
c0ad157e3049b8a20477f25ddc19ac63382113e5d5b81404f0f9263247d57f10
Range Proof
672 bytes (Bulletproof)
Memo
86ae444d074c064f1417b21ec758bee2fa85d047a289368710ea59c982132926f4b5b05bd6f6281c40032a72a767e437f17d6a06819bee6ec250678a648afab93a37b7217b388fa8a9032b81f2767130b75162cbadaf04474474f632e304dd9f7d28a815d3afcf479c7c3ecead7f95ae0760b46f6bb97b1fc1bd3458a8c16d2e (encrypted)
Stealth Address
9016c8d893952625dba508dde1401a559df948897e73c52b67abac0c2768095f
Commitment
9e894c11e3de75d6718134b0564f1514e0246b03129dc9a95f920eecc8c14b08
Range Proof
672 bytes (Bulletproof)
Memo
8ff556615beff0d3db1547cd2daacdecb448e553d0a62123c0ef80b14b8b2eef6ea6220939e85098ab55852291ea5abaeaa135418de009ef86858eb2e66c2880bfb0be39105c68de0ce4d60ea17dd30d9a6aa90a0bd7e135c0a34752e746507a0d19cf43c753f44f5d236df608a3c41a677e7c59d62d4b23de48109d7008cdc2 (encrypted)