# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec90a6a831b42c386e947f2734ca4e6bf8dc50c2765bb52ee1fc47398d0a4a1a
Pseudo Output
f28eda6d55dba9ec53821760f359665c275c23206b2f6746c9b182186d4e1914
Key Image
68dcc8905beaa0e34b90e2234538fc47317758b334733243aeac6af942ef842c
Pseudo Output
58017f641ef50351b8b066a2c4bc990b20c8f1931d9a5c612bfd4a01ec13ee1f
Key Image
347f93693583963759628809720afacb9afc9fa202ebcf9e35d39fe6e005d55f
Pseudo Output
a2205bd1d5e2da22b561e917c8cd061cc03077292c1853619002141b643fe612
Key Image
a885252bcf49809c07a5cc72985a6f6011377fd386f3ff0c81fb8384a3b7483f
Pseudo Output
54aec5f3064679ec338593a2099daea33d6364329bd013b3f99dbda65018d15b
Key Image
601de8b8545b0bd56e56feb7b241b14277281846578b0a100962c9f948922c75
Pseudo Output
10c08f285e4021d62568e2e20bd464b8812619599a712ec1b064e37b6df91848
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
64957d0a923bcc9bffde75545030bed8b6766414836160b9ee4096c234465119
Commitment
6c4f1bf887f2b141fbd1b5ec323300063a9c73bf99fc3ff8b19cf453d7b35770
Range Proof
672 bytes (Bulletproof)
Memo
ae216f939f80e08c638c68925a77d849a23c8ef40667e15d067b1de79aa0b06ab1fcba7edc42e0b1e6d9c13b8e91652af675f02752678c7bddff224d9556e173db849e9dda0315de504b26e410164113bdfd7c00f540e1cd4a3b5893e4414b79ddaf679aecf597f99046ec777849a2f892252bd6127e7996c2e3e1149ba19cce (encrypted)
Stealth Address
c015cf90dbbce3e6a9d65345e295fa93c6940ee5857fde5ed08d84e889535a0a
Commitment
fc369d7275068e4bfad4c4b5a6d54501e01600c55a63aacf48d702692d373c46
Range Proof
672 bytes (Bulletproof)
Memo
bd255ad3c06daddd7328b645c2f7b66a258bcd4be319053b33656c4c6c692bf1392bf2e3bd1a8601b8498e0e00724861f3948ec62d15c2c9f30249ffbcedbf61ec5153d4c38b394ea575d8d04834695e942913ec17f217eb73a0a92bba7a3d8477fc000685d23586132b262d37e60605bc4e31dd94df4b5aa062f4824126165c (encrypted)