# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f007840867167363ca01f9c0eb94d62f1aab71e2ebcebcb165acb6fc31a23a37
Pseudo Output
aeb0304d6489f84ae72fbef874d48375dfcd5b2eacf365ff9e19c92502dca56b
Key Image
2e3761510243ce1a82a6e61f5f88ee7b9fa5363c50cf7e9b58ea77c2c4064d4c
Pseudo Output
6a54c06a06b4770b29ac360064ad1eb7949401c5f3888d75fc699d7f1e735a79
Key Image
4c73e304b4ece71eb4f5e9b0f0c0ce823671f82317609a64c6bc95a75aa0d027
Pseudo Output
20f015170cbdf2f99b48b785476a2bc4aff84d3281ae3eb74a9ef3612de25b3c
Key Image
4866a89bc6fd318432a26a55a07291328e420ebe01dae7aac8ba3aee40b66d0e
Pseudo Output
a00414d204cd59837abe26d14bab1ffa18c8539d85e1e0f3c0858f4683057962
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
120e00be0a980531b299600c082a3dc025eed795300d1d08678002c2fe35ec64
Commitment
c08e6bda329cd5e6b6dabf40b5ba7421f3c6e319d3d7aaceb1d4a3757f06af01
Range Proof
672 bytes (Bulletproof)
Memo
4a29983eeb1fa7858a51b315978ca7302d03a7e2031c6a47352fb465a4e712f91a6d7c711210de87ac93bb1d0717247ad794a7068b433ca092736c02152429a7d2782d7add180284696e26e487f113e40591905296f81fb8968f5a52eda8de9d1e008edfbe41cd9463e6c2223063d4abaaa4a33c14b87229d7d0a242566e3552 (encrypted)
Stealth Address
148418388067512c6a7a3ad67c29782614f9cd61dea02ec77abbf248c0f52e03
Commitment
ea6a617864306e90d12ea8ab56729252b299e2d3bc3c96967961c273c9c1b926
Range Proof
672 bytes (Bulletproof)
Memo
79b1b1d144e053f05a0c31df70442912cb9398ca29f147fca7034c31fedae226a652f63c4c251d565d861cfc5c1e646c6f747e8d4a545b8dff8e8e0f890794ffb4802d557dcb6cb8bcbd8eb76c3475a7af3dadc8aa654750e034ee5b0f71191d9fcf2bff011bf7f69693d0169c2cce0991f1487d025e5282a97589027b400998 (encrypted)