# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
467d3f34ddca2da16f5f8769e9b91848a74491c7eed571007179686f6fe42a43
Pseudo Output
5072e8f644d2be7ef1a54c829bb33ac5239df37343d8150caeab7cf6f0495057
Key Image
003c6766575625a497c147a448ba00d15dd3a6bd2ac0b2e78a2d2a27330ab846
Pseudo Output
60c3a815589b45cd295d336b13da72dd0b008b6bfdf5b462436c33e3edbcc94e
Key Image
3045b49c178fd3b7b007808585e480a08b17fd8d328f398943d5de84187efd4b
Pseudo Output
06b7928362cbe3e0247073f2e32c9fbe199d8f0800fca287783242ed4af9583c
Key Image
2003e31ed90a2421546b13cb10f021e3fee95da9311935c99f6f9f1b42995d41
Pseudo Output
847181cc14f7c873df4ff6c5f73d1cc5c636af87c2b39dced702df7a54dfe437
Key Image
2a03d5ebddbebbcb6d24e51dddc6e9aa593ae656c327d7fe155b64f5908f9916
Pseudo Output
3ae887c4b58059677901b9b9720db6e14011a6412354895741419836a5ffa547
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a255785aeee31410d8b8f1f62c2dcbfd5a3d6628b3d5ebcc83ffc3dc7f22202d
Commitment
94d8669504227c45f262df67ef784c1cb78b43d81ae715c4ea644e38be356a29
Range Proof
672 bytes (Bulletproof)
Memo
ff2592d9d97f9913c1a4e17ea3660cb1835330b0e48923a2c5c6692c907ce4cc4983adb4be8f7070bddb50176df906857adfb50af8aead37db433a0b6e84a80904d791a04e89ac220d88c41e00617938b26595c5cd820768213525ac05f54d53e2a46bfebe0c391bdb9cb3afe135052b860e4be3a2db439f251652cb6ad05bfd (encrypted)
Stealth Address
fc976ec9028b22a57a9d0129107167230a468404b4cbf92ca32c30c9ba669370
Commitment
1489ac3924d39e386156190ea80d9a83c2faca97be3f1fd35234f05fe727c07e
Range Proof
672 bytes (Bulletproof)
Memo
83c935a20fa9d75cacfa13888a6388a1d2ca37938f4d5774fe0e35fad3e60d72e5c04bbb66bad1f8d85a01d2aeaf0934e81ac047f4cbf37454d72a12253d5902ec564f4f7916b7c61b9e5ffe7e6a3f7fb813a4e4cd5e621a2ba4deefca3bc60062ee58d90aaec4e012b70822494b758d63d85596b934b309cc7d6b985d5fd910 (encrypted)