# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2cfc4cfc33508ddf371f9c272fb10909623ccccf7f8b7d5091a283c8923bb530
Pseudo Output
6e887323cdb5fe972bf1b4bf0b5f63f043b08e4f97b849a83daea1d0b72fd57d
Key Image
e49db704d3053ece81148daad61faaed6128ef50eb3a285a2d3c9c124e8e380f
Pseudo Output
a82ff67a64ddd1db0351ec61f2cd3218f3cadc907190ef7514548a871b038003
Key Image
025dd3821945cbe1438f3377338a3ff225daf2a57c3a3b75a78b75647008c909
Pseudo Output
42ecc6730153cc64a8d3174e051c81c60813db5d62e0b2907c537f3e1b94244f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c329b1757c87a403b0b89d3a9cb495d36aa36950a5fbff5ed478a8134ff5e0c
Commitment
b0689a7bffe812deb2872d8439cfedf5b1b9b491da190bacd572fc1f9a1dcd07
Range Proof
672 bytes (Bulletproof)
Memo
e62113541d3a28a3ae26c6928d010c1f34cdc32e033bc00489b016d40fde51cd88f649b01aedcfd74f0727a769b1b7894cdfa222b7bf7ece4a4e443c7e1ad27610edb6ca13d9dda4f19244b0b57741308db6295947cd33de9e496693272bd15c8394449c12ad05a96e69338b55a20e967825dc0131208592aca6f47c90185a40 (encrypted)
Stealth Address
1e3842008988c5a158a417ea4c84a7aabcb12528bd404dc423707caa02dd592c
Commitment
c66994adf66536c796285953432acd0d2a598347175bd924122cdd9f15ca1d0b
Range Proof
672 bytes (Bulletproof)
Memo
c0bfdee3b750d112f2655d53bed29ff85f65053950e991eeafa01e77e51bdfdc5171eece719e2b546a49100c196fdb3924105b5d490003ba521504208f502d284acbd1f7d17f52357440e586224befe4aa5f81bd1f1246c75c89049a5ee52fb9d17f2c57ec228764acec8c211deb276b1500c9e0403059c43d15555a95f52bfa (encrypted)