# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
e28b6444010bc9ab86f5bb895a392b5d82d62ecca29c6da693dfe91920fd677b
Pseudo Output
5e10cee26f35d21c0c74ec2983e5a213f4bbc4e5044e811d42632920a5fd365a
Key Image
a0446ac728cf57494eeb2c3fe28d0f8049ca0ff319716adce37ae2688a762a6e
Pseudo Output
36e087c323adaeaa78d9dc377aeaceae0b946c4a3bc65dc6189dde9f18a48d23
Key Image
fc14d168565bde82ed63c9d2d7a3dba19d052ec7aee8ed004fad7dc50a2e4155
Pseudo Output
cc3dafc1f97cb3ff16ee25533c43239bc9bcb73492dc0bd81d0f86b274f9485d
Key Image
faddf3da3c732aac9c0196dc1c44849e4c3eb989f5e637679911c2a8bf25462c
Pseudo Output
94ad9adfe2d262a461aa4219169960b00d29715ce763eb897cfb1fba6da9f52b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
42c883ec32ddfa3c205e6b41f974c43d89ecbfb7828a083eda1768c7ba762321
Commitment
d4c488bc6c183ab65c30bff21343a74fdfdcc89838bc1332cb25da8742265b0e
Range Proof
672 bytes (Bulletproof)
Memo
6a578d8584f8ba8e78d4714543ef3dd64b408da0e7d7ce5e3b145927c87958dbaaf95c4980acce24cb0c785c69304aaee581f12620694efd5b9a1008c04d3d032f6f76e86c2e0954a6159b6f86eaf4b1645b745412a6378af98f620f4e70f002a8ead83867853069314c2fe6281fb3614b582782b9ca5697eea56ad3ccc2e656 (encrypted)
Stealth Address
a2328f2be197b5616558fa2117d6ac36040ee3336eb0829796e83160cacaad7c
Commitment
f618adcea89511f43361a46cac5f0f05a5000aa5f2a3c02e1ef2a762fc6f837e
Range Proof
672 bytes (Bulletproof)
Memo
5f00da1bf9e778b551ba1f5540dcd21402fd1ddeb83e4259f449f38ac2e78622f2940b78df7582fa8017608c56a32120d14d3450e8ca0f3b4e2dde94c7a4b0ac76d926d951c8159a79545678626670ee3e4dfe049f0bc516742d1dc86af60a2375b9cb2f4a1fdaa658f86cbf855052eb8a66673fa7cacb70003f1b6af49ba75f (encrypted)