# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74b7d140da423838278c0112d2408175dcf860a62f2d1cd852fd5608661bc738
Pseudo Output
f230d8df68bc8abf9c7c94b5dd1cfb3f72b511daa00b71777abda38fa872622e
Key Image
2aecde7e4f62aa5126f38c7012806721fe90e876065e63aa0616b604a64b1852
Pseudo Output
7c424373c7d1dfc0e2ebfedc3185b095239778c8bc757d6451288dab028c5462
Key Image
46b1e916680c8d5f7fcaec93a9888205e8c571c74fe7b8e2c026816257190c43
Pseudo Output
2e314b1104a7a448d915fa584f3f9a09ef97b403f0f3ff396318cffc2047c914
Key Image
6c2dfc3b5350edbbfaadc3345a558579175723aebf245dfba20e9d500fe9114e
Pseudo Output
46f1a72cb40fbde53ce13532daabd100d22bdbffbd08e68f04b6af60d1ce7c7d
Key Image
cacc3a91a14bd77ad7c8f93b281c52ae1ad39567396577d46ce7f3f43b425827
Pseudo Output
3293d069d6da61d997bb6c99088ffff3fab43a5d83f53e810520ca8ec8d0e67b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3078f8d58676b830fe0c80323d86371f30629a73b8b9f1d603ba0124d0d2c312
Commitment
e09c7b8c499b96d0bed117f615e9717d95b916a8ac0544a1cd5373940ca0cf60
Range Proof
672 bytes (Bulletproof)
Memo
fa791fc4801882c97cd392da41cef0029cf8e014e846b60ec7ee26f47faa3190ad7e11d7f56e3f0ff8375a4dbcb776323ed39b23da059f64b4c94fad4cc01aed80464357b5c37e9dc1000152dd1b5cf7d241324b3ccb627b4586cd95593cc6c678adca8698c7e0e50e5bc5092192a8437a9ac6e543c928c47f98dd1efad436bd (encrypted)
Stealth Address
809a2d8131ffcd9de5e8d75fdc96b1a388e16848573a398d9b5c2e46b92f005e
Commitment
2c332f9bfcf4c4a9ebd58c4b94383afbfc10dbbd7fdffbf6a6110174dda3f121
Range Proof
672 bytes (Bulletproof)
Memo
f4dccd0bf13d3fbd2126da71f1a241535b5437ddb16dfb811e3920c82149ef7b29c93e4c6fcefce4153fdd9c81516bf4c7e2da974a75f9b5c09210671536167609870ba5e3b55e499cf712939be2c5be951aaca259eaea90e3a6376a8cd293f16deb7334545a8dec1a709955f026b8fb6b895bff654d3eca4c60cf45a7f299c6 (encrypted)