# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
14ddb8fe3e3f1b9f511c04dfd929ae31c7556e9c5b98307f37f9854d4d809532
Pseudo Output
9e310acaf6aca5f997894cfddc5bbbf780f7394deeb2444c788ad8030b20834f
Key Image
f85c209ef957624f766de481c39d4d05460e76381d124d5c6aa23793d8051420
Pseudo Output
643e03e15bfad86120570c4904150e50b2267ef1df87d1dacff5c2cd0b32bf02
Key Image
0c4ca35c8b81bf34561d8c4d17524781fec96a13d8f4d0ea2564bcb717305456
Pseudo Output
74b5307922bf5ebc5709c2bddcb624713b2956cdaf2eb2273ae2b07228e82717
Key Image
6cc351120a4d1444f49d1aa63a4dcc86a60611728478cbfe850076f4605e2c31
Pseudo Output
94381d866b3a6372845760f4acaed42d5489e9538422204fcea11acc78784c4b
Key Image
d80ef9617a45a8fd58c8a862c9a74f3ef92027b2a19822096c540989586fb516
Pseudo Output
f06cbbba94f0894f7b795458b7f590cc3c4f14e8c9a3d251b3a118e23058e66a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2b77c4433a5fae55bc945ab86f50067c25176deae762336aa6dd80555c62103
Commitment
b2a6c5ea4d8f275f586af88c207fc4e250a08958c32fe98e7f14090580d70705
Range Proof
672 bytes (Bulletproof)
Memo
f3c975256ca38fd209b3da99703fbb967b7ede94f4b12e8b6f460bd2b860a213eca39189db53db82a0698cdbd99f2e9893e800f0380150f99e582073b30a48e492c31d76c26be9e24ef90ae9c197bd682e33d299502f4994576c062af53b652dbcee9f6e52ad41eb8ecf399b82ff1e16c76b70e00bad6b87870197ca57c4fe9d (encrypted)
Stealth Address
063984e3a7639f299bfd9211196abf8e7b534504bb09cdde23e6c16b71e3e90c
Commitment
1e342446eaf40532da6d0926fc80aacfabaff1113eab489eae7859c2a280de30
Range Proof
672 bytes (Bulletproof)
Memo
e574de7ba7f5f3dee6b51083a27d9279bfa59c9d3af2d6fc2ba7a64ddff8374dacadb0e292252a23e20bdcd5d07a70ac7182418a7d3c7a524b62b5adad82c007c886d66303e39fc5bfdf884c201bb08414ebd1ba2786ab39900bb708a7e26cbbe52b76509bc1c41673801955cc6ce965fd5cf45924582f13fb04bff8c25133fa (encrypted)