# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f89b3125effb3d256a41cdf7d24efe695b3647ab0921eaa79b0c760cdd679e07
Pseudo Output
34e795ede8ba2fbe60ccbdff049219af04217037bfa3a4cbce7dff2012047c1e
Key Image
42dfc275ac75aef794759214ea19bc3af54a5be9435dd95f6be060c61799e52f
Pseudo Output
3c47bb4198beaf4bec61c5e7047dead84586253d42232224a8342e5f5f311b18
Key Image
04cc5c997195c54ffdbc772f5e9ed45de54994faaded22de44e37394932e666c
Pseudo Output
acce70b6cf01c970496f8011c62ccb985f27f199951e0ba066e9a2b4d75a3d7a
Key Image
8c6d9001fc5241472f2ec7246656ce65f36d8447da77ca8628703d44adaf1210
Pseudo Output
3614536799454429d03a4694872bd198cf8a9a4813cb42845552d4e7a0bd2b2b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5af87ab7f1eddfd84b8c8e11e4282ea53c002de8d279fe3f3cb19bf108fabf30
Commitment
ac4267394ea20e35acb9076cc4521d23f2c441e555e7b46cfd9a9c618836e825
Range Proof
672 bytes (Bulletproof)
Memo
f8bc4422235947ff64c4f0a172f6c5b564da8671410ab4f74d610095b50b4e7446575d512d813375cb887f6c85463f432f8608a9e8e55dfa06cf9f632082e77cafe5f8deaa31a6e3593961d238344f170a8faf2e094c789ee4551c07f7bcd1c48e184e5c40ea4803543e8c9e7ba7560ed36b0d49eb4e5baf4df18e2609fb19ab (encrypted)
Stealth Address
7841f1f68052d99fbf41a1d684b992481323ef0a996d836c5c3a7786f1a00852
Commitment
70bd84cdb8abfe2165261f2ec4a29abb6ecafbf58d265abe77b1c2efaa0f133c
Range Proof
672 bytes (Bulletproof)
Memo
2b60e6e387e1ee5ca16174f8d9fde11675d211bc3066d801bb092202b597455c9a77bc16490a9c1c3bd0c6b0e4ef4c454f93726109f63dc19769b48497c3c683c72a90d45b65eb351671616a79313abd436db5809115120dc98433ac068432a4489e32a8c422d13cd9a4ffc7d73025c47e40d7be0edf79ec7e39fb3608234fab (encrypted)