# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0860c45566d2943df714447744de1752d86168177053f351fc9db660b5e6487a
Pseudo Output
baecab97a1870d107b5bb5a8360045f0490a2d3c8d72b947c53d16b5a05c9737
Key Image
b43d9ef8c548b1b959b5fd1820e04109bc0f0144980dc86389bf81078e454368
Pseudo Output
588d05651bec4da25420d20a60e0d2f258cfccc2f7af14de7eecaa8550d1b279
Key Image
02c3b6a50b7223d22e377c6f9de7b3f39a892b512b4997303d6d28bbc259670b
Pseudo Output
88bb3cdc7a909a485f245a1ab24b2b3172b2bc889391d88461d91c50fc79ca37
Key Image
b4844ff9381e55046ae56d3f2961c15feb96254257627a53446ade468e9e3b21
Pseudo Output
d2db5b9ebc31954da4d3a2bb856e8178658d786c20a9d406198d3d6f18db260b
Key Image
54ad3ce6e64a3857fda18cc032600b09271df6610d93d059fcd3c3046a53644b
Pseudo Output
b4a344b477504206ff11ab7607d1807d43a9a5a6e44f3fb06dce80c13771dc22
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
56f35ab5a2d0cab94176f8c1d5b9da796f1709fad28dd792a93f0254062e2c61
Commitment
0299f9907d3a84d053c634c9801a51e96a277daef007da0f12e3060fc1bd8f31
Range Proof
672 bytes (Bulletproof)
Memo
a074c79f2b7e0cd96aba9e1597c5a7b83bf6d36b7fd9c72345ff8e9db3f963444caf9a898fc639d3700c9cfb8327e1626b3c46d2263717f80907f8bad778d8206c7e19f20a473e99c3100596bcf3b12286a3b98cb07348b283b339fe49775fd51e69afe0f7634422d1714d46afb3c45a87f3e71bc22023babb35cb34873738a3 (encrypted)
Stealth Address
f6c012721508c53510a7cc084cc9eaf85a51ad9570c4b9f237f2f97114f09703
Commitment
ce044f7ec581f979ac2d3bfcea944910e4c43706e6857cc431f33036b8244220
Range Proof
672 bytes (Bulletproof)
Memo
c4da6bab7096859492508676ab0c9a680b4e622a8bb2ca9ac99314d8d02784504735a48cc3b9e700310867f3c3cc1173e3e4af6637ccf4dc48ea3853adfbb2f07c1e29d4a676166a7cf15e456d9c3b3f37bf106d7210746a6cf1d4dca251a2455fe78277fda531191eb18125d413f696d7843cde602b6c02243fc380e482be67 (encrypted)