# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c8b57023adf7dd1549c7e64f0c7dc6f112b4c797f73a2eba6c44f817d31e1c66
Pseudo Output
22ff91de24bb1745687ce003937fa760dc8c0d4d46137ae69495f3fd2a5c3b10
Key Image
fcfab33abb943010f6706c71bbac7fe385ba36750a37f2201b5018003807244a
Pseudo Output
e852f598cb81957676fe0d33cd90309501241b98c1fbbb37d908ccf17482eb53
Key Image
1aaf22c63b1c09e8371054e3b422de8f51f429dd8099213e7cd7000019906072
Pseudo Output
a69c5eb6548ad648e38fb35b3230cfb3b83b138841e6f6e88325a8068bb9d56e
Key Image
6e55e12c3c908a62c13fdf4b2ee0dca8c5373b4d00ab663d33eb790465e5b629
Pseudo Output
183e3a5609de76090797eb3a0fd9a7159cf1f1f06e6ef4da25b8c3fd345cca39
Key Image
485cd4b5247c96da84d2a745e1ed521fa1f620412cd9aac05ee7d8fbdc97f92b
Pseudo Output
9a8e0a029144531d2e4e0371d7b32e34556003b42471b072126fbba9690b8e5e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2a32c46ebad4c268fa8d60e142b53058db2f148bc92e436dbd7439980ac0ff72
Commitment
5a244b225d8ae225da69c8fad00417a634cf65dd48b3be282ae020e30cd52b5b
Range Proof
672 bytes (Bulletproof)
Memo
df119142b86a893056bcefb71fa7a3f563d9af9de53213c95756c42206d87d2c340d2c7947a0372b6376d19e2a6d6daca9ddaa96a1b8cda388281d20d3770609242345c3e46c7f1a2f5dc0be31e8f475f22d6b8ef13800c16518cf8f294f8af7e2a99c63c4ffa49114a6e6c11f81b5675acc745a6f2448f14eb781f0338bc66d (encrypted)
Stealth Address
56981abde261873dca247cce842416ce54c9a1d928e4421a38ee8957b8537b23
Commitment
8cc5ed5c3d5984c770861a6fa741ca64ec4c55b003538e512356742df35d5569
Range Proof
672 bytes (Bulletproof)
Memo
1fc89b0bb1c2665b4881919f6d1c7b153d0e7efd68bcab0ef431508f320018cf7c9ea70742bebc08ffe5960fad2b64c35753b7528051f0aa0435a5a92167f52ff083ddd79f2e624b4ad4c1aa35353793cc7a577de5dbe772b5d4890e4261de323a6097b331bfa6af2061f512d94cc36ec1c9b1a96f76e6ee9467ca7309c63c9e (encrypted)