# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
029b7f727cf36365abfeb0a3a81ba3179c53759f2ea4112d595bd90e82d6261d
Pseudo Output
2a3ee16d9b885ebe8a212c6be3aa9ed36a875c67f3a7ba8631fa6bd37e5fa046
Key Image
0ec1438ea62d323cde014a8aa2fa44e7908f78d28f1ab116c991a8126379b00c
Pseudo Output
daec5e19129578421d49757c8aaec3e317832fdb1310ca174a5bd66024701f4b
Key Image
d6aa9c6f0d424180d9ad5b4bf43aa5d0876b16a4361591bdbe91ee46d6af195c
Pseudo Output
b80bc366c359952240263f13c6f7380525880f8a32de44c1fdcad4a901025072
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e0a0bf0ecc9700e65f7f730fa5305762c07c125de134ea3dd69b88a81b2ac342
Commitment
52261df2f49e5a81b2664e55d813166155577df90b86c78cdb582f85dd1b7307
Range Proof
672 bytes (Bulletproof)
Memo
c431f2e849561b60c499116664df9ecbd93859c79ba3171cc93b050762e82352a4776f614f4b507a6eb611d4d93473ccfb9a9cc0d814ad3d45c2ad5041f3f3206375b8a104cf9bb10eaf9feb1a6d51c78bd3f7423052482cf7b2824f85896741d7805ec614c00c2de1b9eb670bff172f1d90f7d8d92bfbaf81d789c73f62f015 (encrypted)
Stealth Address
5c56fe448bb270537922bbc64fb62e4fb80f704030d93c0170db87b6197b8703
Commitment
50a8c656f27d1a220c4529150cea0675f25ec81b987653a5d5e64327d014d068
Range Proof
672 bytes (Bulletproof)
Memo
da143e335962e3cfc9871fedc2d3d6a7cad173fb06ab475ca732a1ac0930e1bb9155834895982dc1eb706f170a9a5425ce271015c95ade9ac8053de802ba902290a5175f950d6c07aa7b4c9fccb21f3520397c568ebf859bd8ed5f07bdf45141f4056d5767d2238dbc07bd386a8a7ea92ba84dc666aa86aaef8a87ae66a8f21f (encrypted)