# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
42f5752f28cbe1e2c17bd18f0b7070c95e988fc5a95fe167b0e3cdb7bd9de30c
Pseudo Output
a0d47feb793444c0f299428ae032f767fdb5a39779eb9b9a8aaa7a6f6cf5d753
Key Image
00d7ceb3cd1fdf2ab83986f8b8f0603239eecd5d13ec6bd940763ff282146c37
Pseudo Output
2279a530e4979f8622ef35addfc7fe9b1f9d18be84d7988310bf3c740371aa66
Key Image
d2850fd7cdad452e8aaa74637c78f9338cce6414bd18469c27e6eb8a3f129237
Pseudo Output
d6dbb5b6e1d8a4a46ee6308d957e3a1e0eed2c04e75f44fc168ce454bba7eb48
Key Image
8a60d2dfe75adaaedbe4dc919b53d4bc56f00cdf60e56ccab781e28b3e054406
Pseudo Output
a2fd4ce92fda7904d8b04b7b99d7517d501b87874eb19fb9e2155910de157857
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa57e082122607990a14979fee9fe003aca439c6b03cd298bac756f1a9b26e1d
Commitment
5e0692582038ba743bf2e2a7460c202beca250945e88b6b0f0dc0240cafeb746
Range Proof
672 bytes (Bulletproof)
Memo
b60d4fb90d93791c721c79dad2d230ce2bc398dacba083cce7e3244f1fa0eae61e942816a59a92a0cfc55dd41e77e6e0f412fd38c7f404df5b94a94b03c5fd63708d0f58900062cdfd78bbac613210a5118d757d33199e0f37e503c29245219276459eafda2f3b0a00a64182f77d01a36b9e533352c899cb2139155b93bb7265 (encrypted)
Stealth Address
063e175742ad177bf32b0c6462a85b84019eae8059cc012dde485f1bbc9cc07b
Commitment
56abc5c116b09b5ff53ae1349b7214e0930fcab1421c9e402ae2b498baf12f2f
Range Proof
672 bytes (Bulletproof)
Memo
5794a2a6001de11049a4e2db9dae73ea6d1ebb21b8c885cfe3acff475f867f7d8b23a3eba8a886c8cbc40d238cfe695986bdafecf74085b1f6c4fd059d3141f6b3920b95afeaa427356205984eee9298fce25ee52895650393c41446684c5b3611f1ae2c5a6526f6d5a12e778280799a782e8cbe35f036ceaae73d2aac8420e5 (encrypted)