# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
acbd97e81ed3542de4f6265ab554ba332ab145a00a95ea6bd2fe55bf4d821330
Pseudo Output
1e58994ffedee5ff8b07604d34337d29f0bec0b3008819842d8aeeb02b9f4073
Key Image
b6403a465a409cfe298b18915d0067098a30b1b3042dd4146ef4ee99eecda66b
Pseudo Output
d29596c9b193e09280c80998dcbaa2437afe20acd5f390811597c82e3649b328
Key Image
a8fb2208e674695e4a74c0c8ff35c9353d55af34402030605c0393af108ea072
Pseudo Output
0ea9b9964c767686650f69efa3cf13a889fbbe8c9979288e36d65fde6c83d840
Key Image
6c14d6339d5554d8dce7636336cbef8f2fe798d3c6b31fe319e40367b9f5511f
Pseudo Output
669a30b033dc2054504ae87829346abb0b7e319e98c33c66992d1d4f9899fa50
Key Image
424f5bcfecc553c0e30e658090457478a032234bb6a4b2b369414711524ca176
Pseudo Output
c8cb6987524797f7cd747b0d8e3209a6ef00399b8b82c0ddc1e69c5b23ae3d07
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c0105b18d5920e6b5ccd5a33ea3795cff7a8cd73104d35aa60871e1cedabd754
Commitment
e8002c95cfd6f2d1221e6e1af7a65455182fa743634455f7d92197e46a57763c
Range Proof
672 bytes (Bulletproof)
Memo
6a6414b46a35130e5d185baf445b6cc0fdc0a848cd9759e9dc736367bfc3e57e5034e7cdf19e7a880889c448115b856320077fb6fa2153af9928e4350aa5f5bfd8f1c9bfe5e7228c3420547a6debae8e1a784c1034300b448077fdba0b9c892de3fd4f33504c68f567b89346660adcf9415cc7b8c911d6abf16a9a7751edbffc (encrypted)
Stealth Address
186e93257af94e51b7f224b56fdbd2fd2dcfeb9181af0ea35e9bbe660f687433
Commitment
60bb83a326ba20fcaba20207d6e38bf1c01e7529caa18e8cb8bad68e795c9f37
Range Proof
672 bytes (Bulletproof)
Memo
756a48cec31a6e6f1b962518fdcc14c183a417452862b26e3045e685fbb9a53872b0c402b81c09bd89afa0c96e8db2cee7cdb4b19b1037ac309e55e33339ff3870a63ab7d896ac6a3f1705df6cea7db962ddfdc62f7498e048c6b4b4cebc3713d1e7fa9a8c68753998913a37119cfba3c7641ac27342e193a78c8b28e65b7a8e (encrypted)