# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe01575f54585b01e09dddb8b0148eeb052ec3347742709323a8a834e689cc06
Pseudo Output
94b82c96e04ea0f201223f89419cf921be97384a1f4ff18443705e09d8fbba38
Key Image
7e131e6740db86ae0ead25b20bab2ba428522602217ad93c7960a5216401c823
Pseudo Output
9a1462d2536032dede2cfabee014d2a06dcecd1e7b3d2d19e32b123a2e22b71a
Key Image
701d1325bed1cff53945832c0a172ecab1dd93da014d4ffd4339737b2e6c681a
Pseudo Output
f63aaa75105e194cf53ea90abaeb7d6f91df118cb1c9e6471677985a4f50dc13
Key Image
b25b6dcd3f6f61924bb42c38409fdc8a3cc966e11c6b933530467c1d13376055
Pseudo Output
aecee5d66266d8ffa691e97840d03af1f64f61d044cb7530869cae9dbaac1847
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d863b090b140c2d3dfe4e6f84731798f8de7b2183bfd6790b1f39ed7b90d0f59
Commitment
5427f292206447e30f8cd834fdc595fc5dedbb04fce92e79ecb2cadd2eaab82b
Range Proof
672 bytes (Bulletproof)
Memo
399345bbcfebd11427dce37bea5c7f969aa2d8d67e33e2c4f5e893bf43b6c5f04c1e17a90f3a8d278daa79d2a99d9a248b209c047b8a43094ae5afe826a670409a782707f60ae82365f8b766a20b2fed6f143d9481203c1e9ccf7b235bd884f1be9fb7d32ab562c6316e9305b3c3f611c807237930cd12b604f742177e118326 (encrypted)
Stealth Address
443769854c080da0394b37b2158574854774e1dd81b4bc2a7100822a04f5c662
Commitment
a092b85e66491ca5b8bf147c72db96cdc44b761d834c3bece0cfaf1ec5d95111
Range Proof
672 bytes (Bulletproof)
Memo
28b4ff378b54ef56f376922b0564a69d6bc7adc64886ac2fbfadf669d3c1d04ee739c3d735063542d0f90ab0d76bdb419dcfb4312feffda2c943c490f2ab963ae16afbba37d2ca89f4fbc32c433b77959420d3daf569a8d5a30ca9f0dc11983db331a41db497daea798d5320af384cca9163e6620315e3330cf2407e93d73f81 (encrypted)