# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
30c66dabcfd30c31e5e15b11a727cb1b58d55ee8fbc887d646d83c88359e8b5a
Pseudo Output
98b019dfd419b8b277d208a0491223645ec2a8e3e954f5210aefa6afe0f2d819
Key Image
80136a9358b5f9a1deaf7f9d87f02e419370899df0b31fcc034212ce15086010
Pseudo Output
dcde783598c1fbed8b552c081647eb0337791083273709584c1dd0ed0c60b94a
Key Image
36e95fdc88e2a2200d12fa6abc92fd29188a747c1a19bdc9f0e9d55ea015b51d
Pseudo Output
ba2dc2083f5877d6e27e72b435829905079675e92528cd44e2bf8ec4d728c15a
Key Image
8823b540486dba571a688c9cd5bf1b9a3a58e734c03588e3a8f748263a43fb04
Pseudo Output
7c7f840a549bb45d0b1cef4da2aa896c3de6a2ced237275e7d0269ee1c7a8011
Key Image
e8776804da0f0db8a9349257fd318fa15dcb58f0abb157234e324a02f0ea3845
Pseudo Output
947fa6e95b51fdaea7f6e7350e7c1b6addd68f48f022c188d2b24d93b6596445
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b04ffe7dac4a9b133d7fbcebf322d95c2114ec4b729b93a8a6d0d6a142172515
Commitment
cc321497cc5eead8b78d26e6734ea326c508076088da3f1626a6f53893608768
Range Proof
672 bytes (Bulletproof)
Memo
9952fee536f55f2f869dacce279cf3eaa5599da3686c19d01bc0b3d1699a395d6bebc90008252f53c89dbfc808941c1daa13aeb6bc77618c7bb74a9c549b6d5dee17cdac7e681bb7df1e3430d1bbeaba78c59de6e2c33f2140a2766ef15f20cb48bfccae85f65749e8963845dad09677fc4df5c89f3855d67423c2f93686ac12 (encrypted)
Stealth Address
481cb37f2ec00807e424eac6beb9d46b26ef2859e53d8193ee6d266f21c23658
Commitment
2454f8509da1db2a5cae284b9568157b5b2a81cff69728a9f65825980ecd9246
Range Proof
672 bytes (Bulletproof)
Memo
8a9aecbddd4c1c3b93e08b99aebc5ffa5d2fc0ed1b6b545ebde186f228796dfb7c7d3d73b8626503415b3f2ada8ab356a4cb18dce4af77ff4081749d4200844a72a03b54cebd8f035f2dab03a2cc224ab69c0d9a6b713055a29222921c70ba118c9a37f681ba9798046b478faf0485e1a9ea173b479d09d26b96ed88f606047b (encrypted)