# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aec1dd19995c4f70db99cdaa29fd9a770ccf96a3c365ca930d50789b25e93812
Pseudo Output
4205bbc95c48c74fa55fcbc97d943595a7fb75a1288c9e880f974d389386a865
Key Image
2e942aa61b957766e7837e56e8702bedd0c036a2aa608b24fc19d190c3ce676d
Pseudo Output
30b7d72fdedc749d94f62b6f17785e7c600a071b5ac8a5badb42c363c55d191e
Key Image
a4b9e471443dba506bd6996c9fa123db58eaad9d2c495c352261d4b0a0d1542e
Pseudo Output
f0789f76ffc5c1b6f920993e5679ae78006741769ab39ff54419743cf3a91424
Key Image
f275fdff750f94f7c04fcc23bc3cf068ba0ab48e6190afc5309376480722c101
Pseudo Output
8ea8c61f7a2b905f97ab289ee9c6bc15ec7ed70fdb12448fff188a6c37515669
Key Image
0c904ed08aae25e9ddfcc5bfd11e7ed91c678a62ee9ef1616fc334dba0e29c27
Pseudo Output
60260fabb43010eac79dd6fb400f1813d9deb81a18a097de990bdcdec7bb481e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bc5a7f959a0e7d536140cdf45e33f85245fee4fd1b4b45ec1dc74c777aea1644
Commitment
a2f82b10df5077e8e182e2926f442f452c0b44411c184d5f57873b7203ed8705
Range Proof
672 bytes (Bulletproof)
Memo
cd3c5606e00a4a9953750e4af3dc88fff15352a91b80bd556281a07be43e73039ceffc9ff260c089665eb1390773459f2144f5fad7a90e1e2a1f01ff3f629bfe511ce3c16d8e2aa3f8baf50f0aa2c69670165791283bddb3d07f5c456af991ae7ebfdedb997e437f1bb211e05be6ccf377dddeba944f9d6e4189fcf0f9c6b519 (encrypted)
Stealth Address
0c4ec963656627818a4172bb6967afaaeb43351e63143b202bd615b233f80c06
Commitment
144d9ecb41933dcd135a68ab75aa67b935501991b3754e65ab3ffe876fda9b7b
Range Proof
672 bytes (Bulletproof)
Memo
14e5dae6bd7d4e050429f655a0edb0b4251edc09ba6c6bb6cf873dde1d05749713e4ae85a5f44f58bba9e6ef1b13a593bd89e61863d1bdc26926e26c88303184e490eb43274b0ae25aeeed89ecdb0b0f041567e1bebbbfa4aabf9ac26b6159cdb68451b2eba65a0f27be223d9b86fa8b859f82a70f8cba3ec08d7d340a87ce71 (encrypted)