# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bcb2e630a9de9ffddb5b221414a52b9d826bf8dfde8374018af17fe265689e68
Pseudo Output
7cc03d2b4738d11af5cf12f3385b3676e054729a309e26f52f6746ffd24dc00b
Key Image
e618418af14b214cb3b5268e1ceb19da503178dac90baad591f298289b94fc29
Pseudo Output
ac8ef9f4c0b85638af99a25195ddb8ca41ccbf61473e2f612866fd74c0e84114
Key Image
20a7b800ce5215b3831f06c92489b1ec568f9f69a7bf6c5b8ca1f031e31a7945
Pseudo Output
44644b6242885d87a2b0f5d2d463588f2cf4766514e510d4a8d4ad33ce82bd05
Key Image
0621ddd932a581fa752e0dba22c7641ab666e8c13456727b1113c51f5c3ee378
Pseudo Output
fef1b55f4cd8d78d4766a18fd6a214923f3b3a50beed50cdf43dcddea19d5f21
Key Image
eceec197bf4095d69e481d3efdf383ae3f580179a611d6c7de53ac0df3d8025f
Pseudo Output
a6c5442788792e2618172000378ce0bf711b0c1cd210a7783124b4541cb80944
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f639fa62a48f234775d5bb9f673b0ba646b30df77fe7d5a4bbfd8d3c519fb328
Commitment
7c00ca5b1d9d6dc20bcbdd7d257fd880a2f25ee51e816ddeab9c81c530e24d61
Range Proof
672 bytes (Bulletproof)
Memo
f49bbc46a93500ceb39e29aa6fac918b242de30168d6945af9d9637dc0761463c7f7c3ce170ba753f8c50ee89dd3dbe47364ae9ada5e85aaa1efec564e035c9e04838a428b862d1c3bcfc65fa887e266d7b330df32c4ce8a42cba79346e956cb903047ee5d3d98f753cf4baead2ae000ddb5fdf08b51210c8a62b0d77ecf30ff (encrypted)
Stealth Address
7006a9632af426318d2855c4e87a8f365b85c10b64b3889499fd8e6c6feedd70
Commitment
90a06c8c22ff9b8ceb5d989b6bdf8ce15406be53fbe0410411147beca4156f5c
Range Proof
672 bytes (Bulletproof)
Memo
5778ca08a4e5eca082d2252c8ecd56b4ebc7aff1473f082a2d2250203ec4fa72eed022fd2e578ae915d45943f4e8bd2939dacc7596a36c7b3fc916b197a27bac1712490a94e73b67cc39b5d79ebe10737d8c294a57cc0835b3e8945ac6a571506b689238347120774a2a7169313c83eb7f6d57a543c99eab3662247651204c3f (encrypted)