# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7c15c7f6b702cfe4216d95b2605195f0fe4e66bc491932179876d0a6a41b687e
Pseudo Output
066cc3074ed04b41ac0e7ce62fd70878fdd59a4eb1aac3cbc54febfdffe1ea12
Key Image
0c12d6b85120a79e2ef5c6f74a6ca4839c2d33366db2fb9803b351a93ae1790f
Pseudo Output
50e9538bf7daa2bec470b3ba898d8a6a19ebc2c0ac9562092bfc2dc616061a0e
Key Image
24a90268abc38e68da1ecd3f9721d29e1148ff699ed462b158d833607b0fcd05
Pseudo Output
5c0e2fc1f915413b67bf9610304640f574f2d2502e57c95b124e0d8802560c5a
Key Image
6aaf5e822466cb2a9be35649ebcfcbd62f85690fe108c737574d462e7335155c
Pseudo Output
460e33e4003cab1a8c39c8aa93e3d09590bbd4cfb4a73dfdc1f0b04e80dc1a40
Key Image
82398eba25f27ab00005fdcb268c7ed38ff21aadc9d7803184a3b6d134efc10e
Pseudo Output
a4acc7f6e95f6a0ca38b74650d2a7f893c293e627c0e1f2cbba242e835d24b71
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26ed35f4ecfef08a81e5cd3c6248f939c5083330ee4b1171f2d08cad82f0230c
Commitment
78e399e1e4323af3df9e1d1d7db014de3a16331238ed9ba1594f70cd3e983c38
Range Proof
672 bytes (Bulletproof)
Memo
05744d5124208961d7488ed64cf087a064e3fa1bf43af38d55569359e9d9df7b1dfd3f424d9166b96ade5ef3a94e7b36e552a4e26fa2d1c5feff70a21ff205acad3861e6c2508172429296d5c27c7879b0c7d2ea88c94d25cef3e8bceb0504e4de8a59c35e4caca83eb245c7331a540ac396cda323ef609317130f2af9fbad33 (encrypted)
Stealth Address
ba4c0fe2bdc7ea74524ec13f83daaa96953eb13b2e86839ee44eff515bdb910e
Commitment
8acbb596abc05cfe897f359e74bb8ea188b7192d4b8f79f3226be8cf34a5b556
Range Proof
672 bytes (Bulletproof)
Memo
b3baae0a4af915706f155033962917a28cdad4440c7e54b2c6f311fa514ed62d989e43d34d37b3e011ce0281215793ff54d1cd9a0879b060342bb8b7209f10b072cadc4bfd17dc22699711edee43925b0fb4cf141846b330ddf8ebfc63dac4bd79dc11f360b30bc9d6c45b4768103ca23b86394c09f15ab5a7bb169772b1cac8 (encrypted)