# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b42902a7328da10ff468edc4b811b1a386b1462f3d96754d598daede1bb31457
Pseudo Output
c6438605d864dd72e947046f788cfa5bc12e7d0819d2a57b6fd67596fd7cdb79
Key Image
5a61c1998a0f98d33ea135a75d7fa843a590f7cdb055883fd8965677f495277e
Pseudo Output
7ed7c52604950ef52dff1bab5ce9ca1dee7b67fc8caa85ed752fc17de4b4431a
Key Image
9822a8f1301f5f31774f0573218f6d9f1c6cfc082ebbec616015403c384f342a
Pseudo Output
c0ca8f37f60b1a9174bb3ebb4f85aaa18cd70b715433557369dcd538b28dc52a
Key Image
1a1e15505d45da2392ba77f780dfdb0df993f08535fa770f4f491c4834606751
Pseudo Output
8c21cfc76169d3c4e131859751b844379f179a69cefcc6a7ba70659aeae0ed5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3247c0cf1c4708425f8b936b403fef537dcc613c27f9a6e0ab5ad503115f0518
Commitment
e49002d67348ecba17875c2eecdd3459f1005cb02936f66540a05070f7312f73
Range Proof
672 bytes (Bulletproof)
Memo
65edfa83102a7cf22f935f1eaa16f33954de14ab0ed47e4a2daf5c0139b00d751ae60d2e295c2508a3c966942f3da35ada050639cce1d8acc609f7c9b9cb1861dcf12aaebfe9f9a796aa74430d063e94e2665713646b53fd5faa57974efeef33c78293f7b1b266e6b713e5c93b8eaeede01d55b1967091efde4727757f95325a (encrypted)
Stealth Address
365ad991d63fcde679bfdbf603bb55322a221ca6240ebb4d5a52830a185d0b0a
Commitment
5e8206859d3165bddb0c150a4c3c7036fcfec929066fdc4226d5cdfd9d19694e
Range Proof
672 bytes (Bulletproof)
Memo
2da4663b6bd62e21fe61d96afcc981f84586da6826a88613369fa7ec49429b311ffd6a3344d9a564040d803bf1eda59fdb0bfe1aa50f51ab47c0f394e6933676d575700d8a214a4274f273741bd4ddc78671703130ddaf2d99845785e98926dc387c85cd5d93f8fe54be28dfa5ad196992db43894e7b53dfd4aa92dfd08bd64d (encrypted)