# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c46ef9eb59cfb6ae9efc1b3f52a70900efc62540fb9a9b16736ae5a6afe0aa1f
Pseudo Output
60622aba252a1206dde98e7058d7fc674d0c2345b2d2492cf61582ee3607b73c
Key Image
048c93c276dcd98adbc04db91e667e5843ad64c9787ae6908157bd78f4727704
Pseudo Output
621914ef37ef1ed17779d2d1a285b614f4a547bed48d65315e169e566d774577
Key Image
48993bd04a345933247579b55083aca35bbef307a3331a7456d9bfb1102bf04c
Pseudo Output
1a3400115c21fcb8bdc6c1d1bc5f2aa9fc3bdd3d4533bcabbd909df27bac7f74
Key Image
201cb37c8c4f2bf2740b2d4b69dd5bed995bb09c7817e19f11d444993235e144
Pseudo Output
dec505d151b6eb9efd16337be43d1ef632a24849283325f4bfad0a85547f4f7d
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
240ec3fb58dc75c136f584778b8f9e937e506d0a9da9cbb4b7614de61a1f6936
Commitment
1e6e2c211d3c7591f42b8d4f0dddb93a0228ab56edcd52ae5bcffbb2d1508735
Range Proof
672 bytes (Bulletproof)
Memo
26409043b6887106dfabb6edf5ed4ec20edaab326a66fafa60dc392042c5abc0392ce7075d4472c73a2180dea8c4033041d7c8f7c20dab4c601bd0bf1c2219af353fb443025fd144e6a44d136ec833faf10c091b7692ae8a8943f77de4c12a2f2bc8fdb45dc834bd771708bc2c00f7df809e94cf13875bf776d1faeb9176adb8 (encrypted)
Stealth Address
9e8e832a5a65eb3ff7a89953ac6367604738bb60c9f4cc3462f75fad1dc48f72
Commitment
3447a9d10e7a9a0d6191a4b07c64f51b3bdf021dd222323a26527b9e92745218
Range Proof
672 bytes (Bulletproof)
Memo
0ead2beab2ceb99845d672833daf53a74e43009b4615cd620102b8b32ef5bf10b3e9e516e6f0c5db7df066d8ba9ef795abd9e9e63d62a4f0a3e901344c1780a9fd2169f2c2e207ce91b230a395ff787f1b75de9c2f8465806409b36f3c69f8d5f2ca92ff093b11194711f1fd8f7bbb67dd59ad733c48d03b11fbbb1f0e1cd803 (encrypted)