# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b6ae01a1f8c7a077f0d2c66b7a6eb2dda48ad849d1136d1139e0990bb2122b48
Pseudo Output
e42f2b93c38645e102c0c44ae70824e4618cfd76ece793bcbbe2681412d21833
Key Image
6ca33898865cd5e656df157ffc8479f4b0b01ff9958aa65d753f9ac8074e2723
Pseudo Output
b2f59623486fe59e7923437e6ba946f99f0b5a61c63054fe485c16e05943b265
Key Image
9c46a10fac01d7090339f962752a17cec54d9d075bff55fa41197b6442999f30
Pseudo Output
648b8682ff62a8b72832f92739e24f1995e179fa5e2f406832a3d7e990410c42
Key Image
66d15955eadd71beaca7b45adceaefa453a6ba2410df63a5370c296801053c1e
Pseudo Output
008040e344b37a369546f7be707c7b6f347a098c4513f18ef4b5124324c0f002
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ace2cf5550d4c6992199f03fbde0be46af27178c975e91d538395b34b5b11727
Commitment
58502595eab2b96bd6b3f85fabd25b831a121a7ad6376461218cb254f95f8431
Range Proof
672 bytes (Bulletproof)
Memo
a32cdc97a27b308c6744f1f88782543c1640c3b62191ee9f6daa05bf9646bdd4d6dfc3d0dbff1a1c12a61ac066b57bf08d951626cf99e78ccf580fcbcb8a42c00fb5daabb51bc878abc501071ebefcb8ad831c245b03c1ab3a7880635dad59046ee2288023e3a70cf5080e96f5014e059e906de62177b2d1309b5dad1174c78d (encrypted)
Stealth Address
d2a6365eb1e2c94da76dbd641dfae536b796a8290bf482838d0b16ab6814d935
Commitment
5863cbd758ce48225d729f7a145e3780b0c1be047b7e58ad55fee494a694b220
Range Proof
672 bytes (Bulletproof)
Memo
727de743f37e5609730c300ad2494dbdbf834e0bb603b736f1a97504ffc0426aec0ad9dca29c2c57cb5de6bb30c738afb01d0fbf1a7ae2376588442fda7e23f4e5e82306f7160352497b802ca959cdeec5246d4424a708da118cf71ed129b641cb5a7cd90bd30c021ad127c9a6592cd6d1207936873c9e9bb27e27f39b545143 (encrypted)