# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
52f5b9579aed4002e14881a7393e96d745c617923e4ca86963eb29e6ce7f780f
Pseudo Output
0edc14c474f58a63cc9b20f0e1f2608f7051ba389e432ad932f3fc21c4f7254f
Key Image
108597e4da9638e7a329fb3b03995fc167fe0e16c0f8f930876fc661b99b2152
Pseudo Output
b65d9296337a2651e285c08d88298824f67677d83660d6632c17a63733e4e455
Key Image
f66ff746fa3422b938b482b468c96e845425a70da3647b330929d2baa0fae974
Pseudo Output
eace93f965414519d88fac26d91e0e770b6bd5e8a80684774f4f3570b97cea4e
Key Image
9e0073c3d9a5bb53cc082031bbc0e8b7391ed8fbe225a76764d1460db68e166a
Pseudo Output
aa35bae3372a1f84c941924a63d58ee0d8c326224f1d6f9c91b9ccead1b34372
Key Image
2203b59e4013966176f6b52aaf30d19b8bb8c12e9b7df6c358039194a8e63c0a
Pseudo Output
e2d23a0848c06d85a3d72cfd821b1769c502ead0b1a1876ae805b5a2b6a9c937
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
42b8ee06d7f3b97d2f0ff877a24e2ea39da90469e8e77efb3ae0bda2bb48a62a
Commitment
a43f21da062ba6678919904034f495e84cea125b0c77e6eb7f4de950868c133a
Range Proof
672 bytes (Bulletproof)
Memo
c9fd1b45e8ce3f37c7b84a7c5d463c918190a2fabf64582f2fcd0360f6e345edfd1d8d6fc94966fc73c66aaa3a787ad8879bbd513b8856f5aef374d3dd71a2e9c7ffb2fcc1841c7faf6240fd00d08229178bd3157c733d197db5547276911fc9b2c868a5199f319132c60b853e1bd1e87c456327662533a2ee9a3d629e3bd270 (encrypted)
Stealth Address
52d9c0ae69aa803f2483be5eb0921f0063a870bc2b50820643465e10cdb31179
Commitment
8e7d13c3c1f00b8e5d17c7ef20ce41a278781c0c323b20f747061543ddad310e
Range Proof
672 bytes (Bulletproof)
Memo
5ca7246883f01fa901e10c770d27a90e47b0f00965043243e3d8794d6b4cd03b2f4ab9edf36f48e3d79353a30c0f45e7a9ca278b1873d96aec2c5d046edeb214c27e22087bd360f1321c69d1e2110b1f6500fc66ea75ef2d007ff4da88f954447b2cf82f3e675b53f3a883daa17cbd3b2543a7d668bf478b9738716bf12247a0 (encrypted)