# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2423de59050cddfce93207655c31ad1ee17a590d61ec27ced84fcc798fe97354
Pseudo Output
3200b0ae656cd97c608f63f2d3a8c09d31f4b0866bd0740ad0cbe19287ea1147
Key Image
28620af1d02c0e27e278358666d27522325545332e79e6ef1ea59ac9829aa207
Pseudo Output
f03e6ad2d11bebf0fcff9d72aaebfd27d2fffe8045e084423f0d9248c240ad42
Key Image
6ce77721f3a7f25dde9d0fb94dc76b730c53c57cdeb1cf9807bfa32a06740e0d
Pseudo Output
dc23bbe7c0cc0b7be79c1bd1bf6d5e2e6fb5732ef0887d553d1284a60cce4c4f
Key Image
a0f0ba1de22b3ab22b1537194537f15ff45e8a68a8c13b4069dd5dd9cb06682c
Pseudo Output
90c6928e150c4fbf01253dd5cb6f2aed66dcce7f8252a25752e1ccd44c50eb57
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
1e388623568276fd4703bb4de404dc36f162fb0288b4f7de3e2ebb22a64d9806
Commitment
34f3954e97b5e1a006011041b1da64e3301baa5b167d4edf802c84135e94d85c
Range Proof
672 bytes (Bulletproof)
Memo
32fc06ee7c28c45d0439c903c6a5c88489b7c898a28b01d0c4d117a7d8302e902ba38e501a9ad52ed0b95f79db904efc9ab806cf3aafcdcd3f0ffbb2f9cdc8a3f8035333d2e052678d4357c43e54ef5a7684a51da77eef673c66eae3ea9926e562e5da9afe9ba85528b64ed68a0a819e47a215d2bf20b48c4f571d0e9d48be06 (encrypted)
Stealth Address
04d15d8a9cc1292a1185b18267382ab02048702ad1ed4d902d423789e00f3861
Commitment
6265f91ab0a4995ba147bafcc32b05619839f9f13b0aa41e4351932543a69b33
Range Proof
672 bytes (Bulletproof)
Memo
070ec1f736c2a243529ff1ecc66187f17fa1259c8b43d825b3072821cefea5064b194f420bf1dab2389a97664d435d794fc66cb5dcaa4acdf29a517955200122ad1194d0c9a2b0a62c0b9b379c2e81fff1000dece3e95ea88a1dedb2daed65e26d3653a623c125c8cd6e22e76992d5745095fea397d40bfb1b0a7270b1bf7baf (encrypted)