# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b81a2ec930b736cdc6c95366edd9a26d9500efd35666929c72d86a1019954423
Pseudo Output
7cd703cf871eacc968df1b37df59df9d6e45af2e29375e3cee8892e4ed934d39
Key Image
daa449f090c888ac4739716ae5c1d8865bb421b7273e1ee096ac0672d160986c
Pseudo Output
000c3242c5fb776e6c0d011c0183715b83e50d78449e7c58ca766e71f326ab53
Key Image
fc31b836a74584cb5f716dd38e9eb85468ee0a04ed26c8b00e0430ef1ec16910
Pseudo Output
267b6843e3a456ea10b9a90507dfd65dda20ebb44e4932b79784cb7869738a73
Key Image
5eed79ea77dd58361cb96bacdf0589049dc7515b91732ef32c1829fb827e5523
Pseudo Output
56407f4921b04a9864806818465d0b2a39afb25769c7a2abda214dd8513b6a12
Key Image
06e79ccac969df77b89cbc9b213a273d6a06c9e02d3f7347850140dffb95255a
Pseudo Output
b63fc1a649c98df0492698e9ea3215c3e77708673201a1f866197bb4459e3273
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
18d9851a5d9c6a8e5dee21ecf3990329246f494f1b4fda30db8765ae7de7a175
Commitment
4e60433180d80f7aee6dbf526cf3bde6e78cfe4066818726ed4b9cd630350e34
Range Proof
672 bytes (Bulletproof)
Memo
47506432d446ee665ecd7d2ab44d38288d1a403d0088b5f69b91ed3527368e25d0480656ea1d3b601c168e79c2efab92da69a41ba28ea4a4a89792658aefdc5232117cd2b53fe7704ed5c782c41b88faeadd07da3b92d701d4512f0e576d3ba6b7791e2b5c7582ef9e592e12d867cdc7bd3e7f5427e94e3231450e453b9f1593 (encrypted)
Stealth Address
d87dae1d2384daa630f606fd9259d60018776b9033abc2b6ced7348cad2bb378
Commitment
92d6253f3d62b061227ec97441ac6814e26b28d99bdf1a74ca170684c919e43f
Range Proof
672 bytes (Bulletproof)
Memo
dcc11fd798e7581e04a0c5c79bfd23be4e3b7486d097dae5bcbeacc661694caa83e6839f49be02d5eef7d9f3dccc2c76419a491ccf24fa8dee26f9f9862af1592cfac17ae7cfd00ce96a78e011da4fa5ea89ffdfc835373eab852d444dd4190a331a520f4ddb3f1a1d5fa5cbc431a473ab0824f23e16380ffd4dc45b60ae48d7 (encrypted)