# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5c2c8d8ede0c0e4754f7acf8a3507313f2575cec1eedea46dd2057ab15518e3b
Pseudo Output
9c0be6476e7a199ec7deb9c0cc5ac8da4e90cf8b6a543b4fb557e4d30ccaf438
Key Image
ba5ec29530a82c0e3ab27a3e54af57731c908034f48c9cc6b43f7498926f5439
Pseudo Output
14129ffadb13aa405f3694b6cd632c66508fa84f1066f5f3d6107ddf331bfa77
Key Image
8861ebfffd64f314e72ea6caf98b013e2f4bf2e88733aa1b0809c0dc6373ab57
Pseudo Output
46c73c771704b6e0ee75cac2378fac4e1a652b840e88e39fdf393bf58d0bf464
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
52fecbf596164583a61f342c3c8142607d3e18df6ffe5b66a9a2255f328fc330
Commitment
d2414f7c376dd270cce5c014a3c56701c508464110b49be786e0f63ed1b11c31
Range Proof
672 bytes (Bulletproof)
Memo
cf276eae326ab713e2c99cb1b05b2a688bf6f6892c6a3766f66973d8d4b4056669787ca5c635f6648f20f5b56bf485ea0655ce23b5318fe4d58bbd4ccbadc2ebd090c73b28629ade2bb16232dfd3b6d72d1b3002af98999d0a6774c0cd67e2d3561b74663f4103aa72fa862076976f7799c50b3cde5ce0880e62b532d89ec8fb (encrypted)
Stealth Address
a0b8b4c7f75571ad23c7ec4e2f82f2170f14a3e6a2d44b9328815d350a77706c
Commitment
1226a98855747608416cff1a18ed5ed160d4a43cd849715f29c6123c25b44867
Range Proof
672 bytes (Bulletproof)
Memo
6effd57980e5ec79573580936db1af6522da4122a771f85d277099332788d87674238331e383cca36451499643b3f794d504a707724c1aef8ff110ad85befe9f777a73ed06bbd538780e74ab0e1f03d05bed83408e608764315c0893fa8ae17d0f57ab5b7bf4066683dcb6ee1d4c430512efe03f8fabadd83d9b1f8a8a30e102 (encrypted)