# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2ec7d3d70b5701d020e4a503f7c4e24382376907caebd1f3143b5563dfdd296e
Pseudo Output
32fb6a2fad36e857d8830cfee90f2adc19e81c1881392b3c242cb2a4bd60a642
Key Image
380a571c4d7fde0249a8abf34a57e23a6d8d6ef546ca22285d204ae7e8708e55
Pseudo Output
8e73d8a02a321d63290682db76a0c2843dc0de94ed6085be2c86ae107f72dd24
Key Image
18a5d895a06d67edc97d55f5bc31e4f2e98dc32058eccc1264c94ac70b4d4426
Pseudo Output
fc6998cbdee58ca0853ea825d7c441d679712635922780a6f6135c8cc37d8a6e
Key Image
a688c8bd84c5e09ac2c4e0172eff5e3f8ad90cee2339b71f6d4b6ac8b7590d31
Pseudo Output
04f570fe2d4301fb2620a8f66cb4e6e37c18766e412b18ea2b658f28489b8e3c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
c8b39331b009fddaaba707f2d0adac84bd8c7f8b42a08435508cf3880dc4fb26
Commitment
b474633f795e3dc2caa86edb3366d1959210b8bce1ef62754ff885d95b18832e
Range Proof
672 bytes (Bulletproof)
Memo
47009010e2ca29c625163fd174aaf6527ac90d7ff7a7e7de607b36f33f2fc3dac830b217627298e2ed09ca04bee6e5c2046423d480f9e7881cfafb52f4a09fc8f65b2f6a182688efaef573c219b546a14db192d71c520cc11bf54f7724b0b65f3f9f153e2b33d2a4b9460fb386ec1450cfe02bcf80f604177b4732ceb4f009fa (encrypted)
Stealth Address
44065cf39b7ababd63c01b507b1ef72fc14b3da9b7c82df1aab419bf29615e72
Commitment
34ddb04f5674cb4213a82449122808c47fbb9a4ab7fbe9b3c6a1fea3203a9141
Range Proof
672 bytes (Bulletproof)
Memo
310142d4b93df0096d288ff39ef86cf9e6046de2c92b29e2f3622847dae399dbe224c2973596a6fb4e8a2557b7ef7ba1f62ef5bc37bd62a0ce71d441e7a846f10bdc18e4468ecc11c13eb05e00af0c09e1a03a07fde674e72c752093fc34a9e0c6bf5f53710b809b599277173e9576b9238b4859e137b0e0a1da8fd4cdd606b8 (encrypted)