# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ca2d4e6772655512b910fe84baf098362be03310f8490b376ec805e8e1698177
Pseudo Output
8c3518fca7ffc02ef5ecffd7aca2243daaa13521474e035c3a1f52a94aa7543a
Key Image
da14eaa121756c8f52f8b992d3c5f408495f9b9648cc66a16dc982a868ce325e
Pseudo Output
a6c36bf86161f63fd1a037f996a431b85d5a552dcf32c5f392d98d4b395e9e13
Key Image
62234b4ffb334cca5fa35e880a8e2b1a5184b51d9545b317c3dba5c2e609451e
Pseudo Output
e699ee3cf3ce2f049bb7abd1a2118d3e20f6705880146f2c7624b9d7d005d826
Key Image
88a749e858ab681b6cf0d9880fd71063d06504ccc03019f9bd5a72fbb4ca9e2f
Pseudo Output
681e9e474ed85ed61f72e95953063ba04673920864f8e36345d998d6f41f9362
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f206024b6c93b1c09d083195995e682c640d22ea5b5a4406e7682315312a6a4b
Commitment
38082b2d2a6fb1c8da8b258409033eafcd58a02e81ffaffdfcaeb45c8717e429
Range Proof
672 bytes (Bulletproof)
Memo
c24b3f052056dc38ae7644af0d8bff41ec2c4c97b716672346dc1b0fd31d1c938653782d18bc5f3f7f31d1fe016c840f1631c6f210e396bc1a68db2caf6bc6cc8f86a1723cef2e1d4190dba1e8fa327f2ac1dc6440835e75ca30eec6198683efe69ad18b213a1c99a9609133b16517812a5605476f6328fd55e6c7880169ccb6 (encrypted)
Stealth Address
d82c1359edf58094b162e42a422c8af12a903f27d0e79c638bff728710a14618
Commitment
422f62b47eb3853d8a9b9917eae4571c888d1c4dd02b9f5c1138fccebe3ff862
Range Proof
672 bytes (Bulletproof)
Memo
e7ea23726b7f0dd0323738aab5c1eadae721a4828d81c9ecfe4b2000fbd8d2ef2dd4d378ab485176539d2b5f82a33fb4c5e42096a957155e540cf561e7fa3f9b449b5ddb570ad5f6807efe229fd237fd81b2684ca2d82a250b4397a393c5e5bb05cd5bfd218b4f8cf972ed14bc193b48c1c7c00055bb7e189d32dbb111166608 (encrypted)