# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
54a577e28fbcc7235f4ea0950e2c3549bd735ca14a90d78d0aa9c5e8131fcc71
Pseudo Output
324935f580e5bc8ed523938b7f8206713db68c4df9bd01cc645172e288f1e429
Key Image
98424e6459d03e223bee24639366077ac01bacb98202682352fda2fa8e07bf65
Pseudo Output
a6d334a003d3239059a92012fcc0d93fe9d0a514fe37d9475bc7c1c71a71cd68
Key Image
64acdd68b78f2e3f1ea61ca8aa5a146c49a05273a93ad0d09dd852b59920c76a
Pseudo Output
9ec236133d0075a0a66a1ab6f45c808e1ef85740a97673d25ecc1b7bb1e52805
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1aceb3f31fbd3c40259800905d6194dc6f5663baeb04a7c2a929e24874630834
Commitment
06fac0f0667ffbd94903b4d4246b9ce4e224b7fa5be5e9da76c3f1bb0c93e939
Range Proof
672 bytes (Bulletproof)
Memo
57c92e5aa57c583e7ef35672b69d831d427d21f646052cddd732313b9876414d84996787c19587ce6eeea455aa36810334e62b4593b532305f98a89561c264108839a6d828d9b54952a374d35d3c7d396de78eb828b4192ad27fd535681b4179035811216d6f9059cf5e025b9a45a2772277cd3f809639f1bb7829407aca36b1 (encrypted)
Stealth Address
3a2cfb5dc804fa417c7168278924af7f4b5ac0793332f5bc9a8d8d4d1744a43b
Commitment
cedd9b04e2816f9bf79f73dc959004970f33986f5b11d6445d88b6465c2e497a
Range Proof
672 bytes (Bulletproof)
Memo
6dd50d045ad86d337d8e7892be4d3648a0c715e5735555cacc34bffd5823936ee233a90d0d17e3c0cc4aa9d62ae63bb9b50883eac64e3e7b6826e0429b49be3150b9192283689d662b51bc80968a5a9e882d318edf0bd66a6ccc31710ac82c3391a732012ef81ddc835fa9cbc6b33943d0a1d06ea50851daa4a855cb4616ab4c (encrypted)