# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a8b45ad79a36ded3360e1c96e42f1c9a376b2bf573ca5fd5d06f710565fb303c
Pseudo Output
b866e793d451e10dc1f0c79778e4ef6bb093193be296e3774ef0db78aa7e6348
Key Image
72fe61f8b97af53f69a91cfa1d43a38294a8a81ed579001053583162e5afd419
Pseudo Output
ca0a22efe84e8ec3d4d7e47da6588ec0cf0736f73c39c42212f4122bc149e82d
Key Image
8eb73d9dbda5d5bf2ee0445a738a5fa024e1bd96a552ee74bdc82c35de43f25a
Pseudo Output
8a3197ddd22a7588b8a910589f234b60ad064a76358410a2d1459f8a5926595d
Key Image
947f2d5256d9c9128dfb2d090bc1190c10607ec5b8963b96fbc9e08dc29dc019
Pseudo Output
52052918ff7d71a87e9a1e85b5614f90b7d6bea1d4dbf93da63e90c35f78087c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2697dfe45c4edba1a7dd33fd827e6ff3cda4f5fdfb6874569f4ae7c4d4d3aa6e
Commitment
8424871f47e1926b53a4fc8b1af80c441aab95d4c420075e3caad672438ee52d
Range Proof
672 bytes (Bulletproof)
Memo
632915e49c1771ad0c9c3a4e2e7b4af20f1c0bc27d05a0502b09ab094dbf920f4fc63c627b96a8433cd4adc6536fe3d056b6cf63e4326fa2cc049e5091f7812099fa4d0e8ebf45c2adc121f945283777766619e48c92881b5b89edd707a5e3ceff2e9170d61fc10b1fcc8d39df37ae91de4d7a2d2afac3528c31ab3adf3c5b5c (encrypted)
Stealth Address
e2dc7b3e87957ce5aa2131b6ed6759f8459c15e744fdc395403250f1225f3278
Commitment
c018c3b2b18b9827d9aa29a4f6df59e74d34b8d9838b676884a31af8437e003f
Range Proof
672 bytes (Bulletproof)
Memo
7e1c2c72808cc2d550ab8ce12d6aa4c8abc598fd0d162c38e3b9a42643799cdc63e9ab46475f65de7fce89008ad39c259144da68a1116ff67733200950e8e6ccb620ac85162f572c239b803d1e008ec62cfbee0be3ebfdfd3dedca07aa88e7120dec0a7ef225358367698b98779a6d6eaca73c2abc07a2738d29dfc6c4c9e7d3 (encrypted)