# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00de06cca7ff5991281d74d9fc45c6ead078d1e098c8a057175d7ad302137002
Pseudo Output
a0caca4a153d77615fa7a58d07e7555cfba42108c2f838466ee1ba60196cc833
Key Image
7a9a0d81a8e322806241079f38a700d823c98ff533d154cdc055fe47b57b0d4f
Pseudo Output
a02490e561c77dbb82b299d6d38597ddc963fcfcf02ea80ae3ba7867d5577c4b
Key Image
e2e0becea2f9d1de487f89b9c73b13e9e98e5eaf3be3744268abc902785da80d
Pseudo Output
70f26557dcc7d64d08cc2ee5687e952d44021c9f890430a983d31ce5717b3129
Key Image
1a2699e707b04abdce364da1c10161561a1092128ff7af092995fb8577bc4160
Pseudo Output
80e16300cf7a977e1848ebc3080df165615fcfaeda6f7b29f2955dfbe54a9017
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
60bb66288f12b4ef05efa8b6a5a1dd5456de6a0a460d60501f83850e035f0106
Commitment
32ad4584a85f9830198687b2bcd1ce4e088d56d9214210f1fec94cde32e79812
Range Proof
672 bytes (Bulletproof)
Memo
206638dbdf7393d0863a592315dc7b9011d7f226bd6a6ec9061d7f6fb697a69f737b0e1eb4ff6472733fce995cb485b8cecee063cd920f7f9baa6f6181cda868892fddf85166019ca37566dc19e9f1ad7269a6adeac10a58d738a6168707d60c27147d87375ccb424be7bbbedb1f6b37777498f3b879de61e4c8654dcc089d78 (encrypted)
Stealth Address
8491cbcd0add1c5a49897af215efd16fc163b7f1aa6c35c137b28576d6db8d5a
Commitment
ccd1968f1a572d3cee1345afc8a3297febb74c0d346ecac67337fcd398e1a73e
Range Proof
672 bytes (Bulletproof)
Memo
3fcad4ce22c48426982f165378099c60d1ab9060f75c632eec31d321be38a5c3a484aaa869327e16b517ddd794db49b3bde122bfc60d32bcf9a04b1d9c83e5e55806d4afea618538d7544c62647f0cc068f72b1c15157a0291d060df22da16fae2351ee45d3d993df750fdf5e9c34f063a021ada080dc3acb8f5512f40c06142 (encrypted)