# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d4cd00c09079889a77fcd05ef97cfc85e588123a32a5beac4a79844a9a111515
Pseudo Output
1aee7d18451d82938545f44ce702fa9fff569498760071321750cf90995b6913
Key Image
aef94370193e102673cc0635ae26b834fc53e589053b64b9f972dbaec57eb943
Pseudo Output
a8b57af8808e8675639c786817ed315f61575ca5647e1592d81a872800c53241
Key Image
38fc35b9036797f5520b1eddec0d6e2f7f3d89e21dee3f98e60fe19fb615bf6e
Pseudo Output
2c82a8ed2fd6fc062b920a86823ad91a6f451f18c2a85317e86ff3d1a4251552
Key Image
26af153f3f303870e7762704870f97ace98a4b654a525f5ab8c16bd7ee72e44f
Pseudo Output
ba6a888232dd948affbbeb4de95aca3da14b343025ffe3866d6eef57dd325135
Key Image
98406b3aafb2a663181c185b92adc6714c712fa5b8f6e75ee090a5150cb08438
Pseudo Output
7c33b3c34bc514a1de50b55024d4161501acaff4657b902b707a6c89f8252258
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e236e3c1fad7777eb90725bd0ceffe1a25fec0f65fa61560aff7684f48be4f08
Commitment
644516156bccd35343e9a107c9555710b4e0be46e398a0b5b511732856abd51d
Range Proof
672 bytes (Bulletproof)
Memo
f079bb127a72b50ffc316c951326e8b48c2613cc148f889281715b571b05dd9da019172a003aff5b86129614be90810db32873fbeeaf0d38c05cf281baddd7bf9c1043156f7d0e6d18a1867076c86662b8f7d1d557e0df8479b79cdbbb727e98cfb63eddc8cd8be9fcda2c2b19a2cb3eaaf2d05dc7007b959632379752d2a120 (encrypted)
Stealth Address
ee97ec5a02fce1f05d33fc3ee616d123750bd68b6ebfd028682cc904cffb6e7c
Commitment
3c89ecf4f2fb8b3709be5a8d36bc9d39ec50f47ce9efc2e9bbef9a58087d7b70
Range Proof
672 bytes (Bulletproof)
Memo
9c4c1196ccb3a42c051b5fe321a40bd7021545c91244d903c210ee97866c627b0141d5326aa82bc487447388feb9c07de65b66504d00d983af0ffca13a0ecc8581b079caa90fa13d68f8e54479a8f3fbf394d0163fece749ebc024696ab3a1f37bce7db7eeb11c232f105c6e9b7aa5fc4c52776b172af5e508583973d26b9632 (encrypted)