# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da55e4bc39142e83143f1e4747a604c4c9cf16ab06ee7b465164a57c92bbcf4b
Pseudo Output
8637f92c0adc89edbd7207f9d0e7fc866ef869089e5c3ef34aee67911972ef63
Key Image
78896f0ecc1a2e8fa63fa86dfc08ac10856d9973d5583f2f6b1a0e77bb42317b
Pseudo Output
065a14c40ee9ee669920bd98d13652efb25ada64f01428cd7aaa61784ae3d52b
Key Image
d4c60f74fd63c09eb3f53a6deabe3534609aaa9a566b4e3e9edc8f5d82705653
Pseudo Output
c4d7e03f60806d07d4f0e4e9685f055f6733623c07c22afb4ebd25e9aeb7612b
Key Image
c636417c967ad555c9b97af6393fdcdb29c08c6259fb8f89c2b1ba0069f03d0a
Pseudo Output
8a022c885106529f197c3d52fba659ac5829527463e3db14f6ca60cb6cfc3a7f
Key Image
1c2aa28688c94e6da04367bf691ebe964aec0599a93157cac8f5a897ef17ec22
Pseudo Output
8caeb3d0b46efa214029c543c15e87a62ca8f93109ab5855ddbc42ea2611ef1b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
04ea3f8b885911ba3ac7c6742d5da67bd789a661e4d05544f61abf643a6eae52
Commitment
d81966fe3420cdc364f4c749943cba4c8e7597d5c1b0da79fb92d06c0e9d8535
Range Proof
672 bytes (Bulletproof)
Memo
a699ab2c95a53a475b6e37ea3f02b7680acc1e29513756bcb70839ea4ceda524460c9ca05a230cfffc865be512773c40b50ccfa2526f461465d22e8df4739c9e11892f32191dee76e5f8740b0b4f09915f584752e683546f2f3dac9628271a8d2b6b463c3b508ee0d976f4dc0b4fc2d25eec13c67be995ddc2fe3591e2e9c44f (encrypted)
Stealth Address
665959e161fbe3486d42f1db75bb556fb6fd99ece0d4dd7f78887aa279f74e0d
Commitment
081d89a68b6e460b1824f32c082aa976d91c1271b2daa4c6ce1901a6b24a3776
Range Proof
672 bytes (Bulletproof)
Memo
d3a0983605891b6a41ba7aff0458e17b90d3341359da5d71ffc0b85bbeadca7438cc800317cb86ce22d441ff34797b52767cba2fceabef1c559d673951749eb06cf56518851180f3c00c5983be0eaea1bc0de84c0d9c75154461560817de4d043011e469b1526c0317817fbd75b5d56cc5c64460aab41a714f29c28d5066c56a (encrypted)