# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0ff92f6ed4dca8f7ba0f99caa54f64904a2b25a6ffba8255bb2a6ad8eb69055
Pseudo Output
6804a6972f5f29f3d13b76a5316bb914c0f06fb915721fa6886871332d3caa5f
Key Image
9221c1a79c28b73085c414caf112e86f02aa2c957bb353f2a49cd0b5a10f550c
Pseudo Output
0a5cbd0041c33dc5c9f2cb8556a9f38124396777535e9bf7854613046cf9605e
Key Image
223c56383b4ca7bbbcebbde9f5842b3bc99f6439bf68cb607b58cf3eab93823e
Pseudo Output
54d73c9009a59606d8d1fee588c473fbe01072428e7fa30bc62b70242a648e4c
Key Image
d6788905d07f73c5cfd1322c1a997059e7ab746cd72ed76adf837380e9c9e644
Pseudo Output
3a8e0a703e426fd6aa265662559090420c20daa2091efcae2ab5d6478c24116e
Key Image
e2f1fd009f1c741b6da110bd08e90cdd106043e5ac1972819932a89fb1573748
Pseudo Output
8a7011daaa00d3b9e88da8cac6aa5fe3ac6df0c62d86f4f4fd06f25dce73fd6d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
709956e59dd32ea35c44f46926edf9f94a3748c12d5a4325df2bf494b7aac87d
Commitment
5654940d7945472626965d9b7c2a84ceb0ab595df2599cd9ff9ddf938bd0e33f
Range Proof
672 bytes (Bulletproof)
Memo
3cdc54e62564544f91b2ce9c19929a4ba46114b4be083c6de5a6a8d132f753f7266e2db3b49cd388e73a311ebdef9cc44b0975776a20c3998c934e4dd89bd8fe6f71b16980810308cb41f50b41d52b470698745089321118ae46ee26c4e54ebeaa5ccb498bc5db5cbc5bb3ea074c1abecfd948987a27e99fe78a21cf9910bac5 (encrypted)
Stealth Address
6e7cd520a46e0c8dfba0c6c66655f4205b0cc19f420dc9ad84f8482b4cae8d51
Commitment
1ac1591fac198e1b9ff54e1d895d13373fbdac1ead081a90ae6356b523f27d02
Range Proof
672 bytes (Bulletproof)
Memo
c82b7679fe62b24833093a9a00551be14c8615ca1b126cfab0b0810a11808bdf5ff25e345b5d3c855454380adcd2e4a07046a52b2effa96b609f509379ca6b938ee8289ea61ca69badc90f4b4ddedc41da834bf7e796114de36095253740d0cc8702d2ef1f9dbbecaf9d5e5236674083d25adb07ed46de56597dc1302a0e6f4c (encrypted)