# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d268b1f3dda1a16d172b820819a94f37f9afe49a46a9d00385f9aff04d9d8d6f
Pseudo Output
de57f40dc4272b99b65f59492f93e6d146ad9c681d2d037c1187d88233372867
Key Image
6cb8b82588a853db17452ccbfd153f0fb05b17cc152eb6ce10072f2fc7bd5648
Pseudo Output
6c26e52d3ad2676b163425cceb167d6309c5b4c76529a46d823e866d88b22455
Key Image
b897586d3527edcec5407536b0a249b8c73d0a2e14d1628fcdb883600a3b7736
Pseudo Output
8253d3a30e5cbf34b3a4136d3be3382a60f0ee11b5c3872d6d71f3030ca86503
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
9e206bd8efe95f5cb8927a5ce4909c33a34c924226f86cc6b8e7ada927053a04
Commitment
2c52db35c9221ae28959e9e8109d0bd75aee8fa3a79e078a6e9015836c780323
Range Proof
672 bytes (Bulletproof)
Memo
998b6a0bf1cc15c05523fb365e9a67f3823b2ede0fa54a7400d881a1804b2e8e5b007de9c1c72ff5800d4bc40895247cc4f036379b985b74d332bc33a08084e4c0370921cd0f1579b8c5164989544328e903c55dbbcd3482cc63d31c7b804649b59da8162ff1aff92e622e0699cf85dd9083d0793a1092762edc24d87427d96f (encrypted)
Stealth Address
e8fecafd8bdec8d9cbe2902f36bdb37a2cf905736f7a00a97eb18137c9c75b43
Commitment
be50971bc746bfb7f2497e1ac66ad4cb346e016cbab0f11c993bd4370b82d64d
Range Proof
672 bytes (Bulletproof)
Memo
6cfbcfe4b207761accaf7abee4acd20a4474aac0d68c4c5599b5f1e5f02070516eee712cc34dcb88f7dd518f5504da900580d36d63dd9b77bf1e6b009a1b430036797f00b740922f5bae5e2483147e8cae3ae16cafc0ba78d160555d4a117b392c2989066209bed3e923eb7dbe92b7fbd1f4da29343808d0790c4baf86bd336e (encrypted)