# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
14755c0da5b6dfd576d5c1f5495c8426e40e752dbc6822eb185e700445f59b37
Pseudo Output
14bb5480916ba00ba1acbe50346a05644e50e32be987825a5cde38a063ecd14f
Key Image
ba4598c9c5addf5e1ce8e186fa56fc5ee7c75e19c55dc412f169ae7ca2ca2642
Pseudo Output
2ab33901d2f06b38d86f05fdfa4889fe4748ab50852de2f6fd3857a63e8ee62e
Key Image
86baaa6fe9c2189143788a7a6b20c6beae600a61b9af9845c719bf6a5e6d1e0b
Pseudo Output
f45e106204434619f36185375b5552b0e8257778dca4866e6c93e631b2cc2e12
Key Image
a8cfd5c5bed97d33f4ad403814387658a0834f25af73b6ab04689737cf5ce165
Pseudo Output
1eb073c2f39b24df1f4943a099cdbea71c2bf2e7a39c7c7545c5568ddb45e604
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa21659c942c92da927a968d60544d0e50034f3c64732e28dee8a03479b85c4f
Commitment
7c571a087b6b8afaf87d34777ce44d62f6b449de8ef91e72f7ddb0111c5da520
Range Proof
672 bytes (Bulletproof)
Memo
3f98e5f50e2935d622a7adcb6dd2103e55aa19b8d409b800956c73ae80c7d4c539293889fcd256a7ab902caf95a6e89c2972bc4f5a0001a706176489a362c0b65c0267ca51b266a2139af8f3f71f1fae264e8ef5c576ce91a20d01e85d7627a6c56e2795e74427b078a89a05fe853176327a80060db478ce11f0b589e0bbf03b (encrypted)
Stealth Address
70bdb90ad8005c539e8180b7460b0facbab4e6dd8d5f0c1ca2689af3d5636306
Commitment
fccff1512fb108461ef882aecc01fb641457ce862c8142ae9f417b50f6f9e16b
Range Proof
672 bytes (Bulletproof)
Memo
2468e92643cdfb19e73c6fb9595ec7637373d5e53f9906a9132b7efb1bd230ada8a9383c8c78aa98a01aa3b62a00c9b306ba489e07b603469e4cd4da431c72567742aa6337d55f1b7c6d76e7dbe2f73676c10eff4fd551529d9f7c5e443d6bdcaf5791dbd384e4acf084a8b759d6521847eeedec1c836b0f5f104850206aadec (encrypted)