# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d2097dcc7aa10c7cb61dc9e111bc023b7c93f356dc3950498b2f011f8b573215
Pseudo Output
e0e459af9f93d96bf030c8d112c50ddd1fc164931d48bdb75ca954dbddacd55f
Key Image
a87787aa18e0104c56d47fc70a6704ef4f7f81a18f6740edf6f0d2095abb2617
Pseudo Output
ceda8c4c2d7e219a6562f20bf6b8ffdd7edabdd3f03ba04ea68e9b5e0a726f6c
Key Image
c817245c7ec4e5a25e5adff576e3e750e9cbaa5df4d8c554023214116ca6e155
Pseudo Output
fc02100e824660941db46e766e900d6a1363af4b1d242424f6c87e89735e135a
Key Image
b882044f2ea4cf8f05ec2ef8d3445f5ae16cd8fe3fc195175e9a086ad2da871e
Pseudo Output
982980305d47f5fd8fa1091880fd87719da064691470dddeb487f915141d1c77
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f0c449f3e298cbfe4f514b269ef80c8da76eceb9d0c2fe59a7ded3d760c5b633
Commitment
408a43cc7d7e4dfcd24846379bb06e0aeaabc57fa4a8053df003c0e003a48c75
Range Proof
672 bytes (Bulletproof)
Memo
d6a3c737a68e2132ef374c4cdbc5d0db0c39fc3fc8609aba0e22ec6a8fcd654b247c552cd46b6c28eebebfb29269d9cc5e2c255d0c4c33a1238775f9af97c4af19b0da9b114f86d436349f221bd2fc6e480508376a20d99d7a42c5cc27b8da438b3666217284ffea7f1e839e78814b48f0603f15e1447a4dc69ea832c048fdd9 (encrypted)
Stealth Address
ec11cb91f1d6a9601117b86ae155915caea32bfcd89f2f7dd216f5ac107d746c
Commitment
b4ab2017847a6fa09332e4528efae0e98f2526531084377703d1ac4d6a03c470
Range Proof
672 bytes (Bulletproof)
Memo
edb761cab7904c0e5eacb732baf4517a87c869947d3b7cc0c95bc66a499037c3e06fbd8271c51bef0dda5eb887bfc4c451a46915835c247245b7e0eea9dbe4d00d3116072c88b97199897aeb32d875075fb1e89eb10aba81d12c5f644e59c4ce0c6ddda6356973e8eaadcd6d1e761c85962d3ccf926315552f9a928530fceada (encrypted)