# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
76ce6525ece6a1dfd477df7f68fcda7d8e8ced32a92367dff28595b7602f4209
Pseudo Output
ccce9a9f0efac774fd0750d413604361392f5b22603030cbca620286cf25ce14
Key Image
108db9ac00767136d0bc1b4f7be4ada70b0074c3f198c93cab8d9fc31bad9e21
Pseudo Output
d0d80e401b651dfc5ff0a041f9651d1d975d9be9ff77c0b0c64c8b1d13cba830
Key Image
367d8ff6673cac4d67f3760438438b548998236736e571c77ab8ca0da8400d38
Pseudo Output
c27c14da8f8959524a87c8f44cd0454a73ce8ee130b8fe9e856ed14f60348f5e
Key Image
dcfa7a2ffd1655714c76d6262988a81c61a24f35f3136ae789e7dcddb15f6954
Pseudo Output
92048cff5b8472777dd0a1a4393c28174f5bb48d7a09d4b19dcdd9f87e83ae41
Key Image
a0db56d23363183e7ec2b26fdae6b9149dd280f610b6d75e296d04645a1fad67
Pseudo Output
08e33d887b2ad5b812171cecbdb5c055df54696b0ea13cf78a0f4c186d6f7b15
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0a6e192055c87a2a479de397b74298e3ed04301f72049e9a859ee540097e7b68
Commitment
da6327b777d86a38d4d9f7d9d05e774b82d61ebcdeb126d3e0de427f324a1c7f
Range Proof
672 bytes (Bulletproof)
Memo
600ea79281ab0074eecb1c8cba5285dfc381b3cde477d597c6757f9cc9c2c15b1747d8b5890efd1c1976ff581351e63f53b3b6f48208cd410bab923e5ca8a5dbb09b511fe4b038afca8c6cdf7d4a8d69f21cc80000827d413906b64a409e6d4e1041f6251aac6933085746b9c0e23908f03b8911f866944f96d3ae119379138a (encrypted)
Stealth Address
cc1f62c27a1d931ab5b8e5bb093e1318dfbc1c267c546a9f1b64e3c9da4b7971
Commitment
044031e560ec0278f6793f648b8a38569dc0d46cbb73466b505b2566f118ac5c
Range Proof
672 bytes (Bulletproof)
Memo
bad7cc01bdbaf9c58710ead332bab5d7bc32e30f64c1bfbe45df0d30c6a68c8af48226b9c969aa949c54a856c3f8aaa8bd8ef006ec4d91f55da5aeeb885b41349696b7cbc1f720576c8b0794fd60f2aa09e1efc89a43f7417de4b08e7c52b6e3658826e58701dd93d6915f3dd3b0e3cb96cdede2d010d7c5b43692c6c2a8c44c (encrypted)