# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3e1aef68d5cbc0e4f4da8072a8d880a54ac1d43371c640ea9b10610ef96f6478
Pseudo Output
96d23fab7c32de4aeff38fc83957dd9b577e6f19f6ca6e559fb7915cfddf1655
Key Image
a87b3ebc18d04701482e222a99dab15fbaf74bceeeb2d9c9c312d689ac4c863d
Pseudo Output
201ef426db5cc55bdef8fdd322dfeadd21db2c39b7e9df4d22096a9184c4783d
Key Image
707441a5457a19e99020ed80e2e95b9fabf28292e3306747c19f58259c39f149
Pseudo Output
9e1467d8795741aea85b6ecca24879de5f1619a9a1e121062f166114b323d940
Key Image
a6450e12a7aa1fe0d954fa40a4bb53e8cb69934990e8c4cc3530bf76b5ba8838
Pseudo Output
6089d2b5f9ee0dd2d8dc352389abe9ca85546f0ebbc36a575551fae3bb92fb0b
Key Image
0869f592839b5f1a85577db11df2745fc0b28ce32d4532fe3813dfe4fd720d6a
Pseudo Output
4ec652eab213a5336ffb6ea8bac67cbc1f7b6e70258991a8f14f56f58ac8a378
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7cc6b633ab7f56b17505f785cfbc29ffab68aa838be5693273c3ee0dccdf9273
Commitment
38480d310c8c95da6ca52f03a417fdb6612adbdb5aeed9323119cd6a9077970a
Range Proof
672 bytes (Bulletproof)
Memo
452e7704a01c616b421e6ab767218504f65334d2784036a8e6da006c8d7d9ce93325ebae4b6016d04f7798eea9fe8383d8002e8efe38f1231039bc13a3a4b288c677c261fe5df2ca4958c2e597394c50177bd949b51e7ceab3202df849b43890646e41ba2b0eaafe907d04d8e31c16c54a712025ffddbce663b4df15d12f59af (encrypted)
Stealth Address
6e187551c45fc9d3ffa38158052d08b4d0093c7376e5b91314fc6e02e9c8a218
Commitment
d4210bda7b57240ccb591d8eec28fd78cd4324ec40ff096abfb92bd2055c302d
Range Proof
672 bytes (Bulletproof)
Memo
401fbaa0ec2c2f0c18b63aa2b9be8ccee10aefef8b9acc5f2b0df4a7a531853dd8ea6b81595095ed7672284c44a95b93c59cc2482fdc275b99951ecc34032d046fc96c79bd650cd56e9b10e7b48c4fa5101c3e38f38a9019956efd9db2732a427fdd105f52a0cde42a54fa68252e71e97f145f2ebb19ee6b72530f62e17a1123 (encrypted)