# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
a01a0c2088eefa5f3ae81e07c3f5f06c19552a9c84207472cc4b85cfab7e3905
Pseudo Output
a681c285db4309f55ed9c0a0a62e0303571e5cd449e6b11d0b76e611a7088257
Key Image
ce875ccf80f60216c4ac4e108777c35eee9bf1c82ac62b6996ae36e7302b8d71
Pseudo Output
46c301cde378b3c8fd01ca50a88fbd2ba80805ab6d220e4820c0b287c6dd2075
Key Image
d21f4089d5eb91c8f1704b67a9c778092ba0850bcb97b7ff6f2b5a3139657e75
Pseudo Output
38fb496d84b112fe540cdbbff33eccc7ddd623e69c96af96fd4e994ede94c854
Key Image
eec4e0462cbab2007ac34a2eb0b94b1ed3febc91ba4d3c97fec59a168da48d5a
Pseudo Output
8e51fb77f4e3cb4d66893ce3796c05356e857761828d39ee94be8a42b5f94e4c
Key Image
da7ad553fe0f62ef3ee164db08e3e110110a182b6c7df0ba1cca42f5d95dec25
Pseudo Output
32ecb322b1c3c9dfe86025f8197a5f76d7dbe711f62fc87c6cc548ff83055800
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2324ce1794793c265393d82b5eb2da046fffdffab5798dfe5b470c387936d17
Commitment
38f8da8f719f34e9f8120b8d5571f5425e35d83911da825ea387f4cf0eae0529
Range Proof
672 bytes (Bulletproof)
Memo
d245410c984f46c4017d46e2056b03e7cc22cd4c7c0bbfb4beb6519ef2cd13752fbe688375dc1e3374aae3e401f1c63488c4663383d62d3456e33cc9f66f19b1ee9c48291ee5c9fb9de3d26e2533e156dc7a22d331fe5786a283d148696a31e23f627d880f332c10dc04307fccdd761ac6b524faadfaca70ef8548fedaefce28 (encrypted)
Stealth Address
d4792a1aacfe01b8184d51a79cd7b2f0db5eeab04614cc68d6536f1d8dac010d
Commitment
f4176f7f6540dc2ed5e19a93f68a0b8dd3d15302400a89ecd78eea62d0c34819
Range Proof
672 bytes (Bulletproof)
Memo
9ad41273c25b97f80bd9bd68af1f134e89cd58a5010ffe94a521415e93d0e16b46f3940805f80d5e642b3565af6d68cfc98f10d803f2fe9a538144624e38d30c86cbe396954a4a0c32e553869a125f1e1c699f2174ebd264bca75cdbc3344bebe4aa885e3ba4143c3f4d3464c99970052dcde6ad895ba84109046fabceaf3fad (encrypted)