# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f0ea0bafcdf56c87b695f59c761d50b53cad71ad20ddd28a2ad4294a9e5cc016
Pseudo Output
a2cceba138cac6e6661ea534b2b0755706ad8aa43b910318270751ac7628753a
Key Image
8c6e8818114c1307b37f2c5037a24bfd95b82895262158bd802dbc30ea3c291e
Pseudo Output
1c3360bd96c7c5c461c8ee17a2cc553f5422e35b85793303901eb5f1a1d3f025
Key Image
1c7b977b541088fb22c77aefacb657fe2b4b499fa84829b8236098907339df47
Pseudo Output
165c996127382098fcadf60df6c881a75ef68bd412f4f6acd2a3f532d72cbb1a
Key Image
9aa67751e44f499596b0d2438fceca714c1ad2b8e72afac8603a4782f9c8f92f
Pseudo Output
ec2b85e7ce799071791a622c207ffeaa53822c57396a17e95c772e9c091e4d33
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
14f842ab4bc43f8b7457c25f74c6b6ccdfdc5d9dc2a0463d096c4e036ddbac75
Commitment
d064584e2e54cbb1fbff7c27577610494dff1d57fa9b9eff77ef1884925ee217
Range Proof
672 bytes (Bulletproof)
Memo
c0150aff883509e8909a6c6afd7c6b575bed00c740e7fc26452fd0a088b9c64743a98a5cd02b11e0ff8f7e0d32577d252573808b9b6782f430b71a7afe77d9bc6533500efc2ec62b2e50ceb966d7a3005acaec080dc627acd405a331d4ba691a02741a8e0c00ff116442fc922dc4dd565aa41db5e8bfea6659dfdf2f194b6da0 (encrypted)
Stealth Address
0a093d2cea2df99203153377e3d5024a77981c2b6d8c1ffc2ffa15e07a635d6f
Commitment
3098d404bc10e8ccaef5029a0342e0d9896f4cdbd5f6b6d8a150b388d6325037
Range Proof
672 bytes (Bulletproof)
Memo
11b7bedeb24493b7e126875696ea4eee0ddfc7f35cd860187ca84582d543228e510236d1a391a0002e0367c7f3fd048d2a25b203ebc34c627224f2b27de77349d9225afa41d1247fbb481b3c3fce7d37b5953dc93b3cdeb3c9be905b56fc9374073f6690cac74c101a5872a993d7399bba075d441f04690661cf060dfa9bb651 (encrypted)