# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20900e098cb6de29c6656c8fa7d9ae3fe35a3d64f2eeb2db55dac93331b68226
Pseudo Output
7254f5d2a0819fd0d6adf1499f927377bb97bbd888aacf289098f9d8d8954636
Key Image
a4a711a9cfb733848c34d918fb73f88ef4fc441de5936439db6077887801650a
Pseudo Output
da490bf45efd7a6fdc86a9a8a5c2781ff9aedfa894ebe06a6244cf293c6e4f5d
Key Image
587fdc74c82b917739406f0e3b79f5ce328f87e7f65b202ab3971ba957410a76
Pseudo Output
98cd080ea05691197ab5bb84e08dfe9d4c8c7f9bb26775824afafb92f3bc8b37
Key Image
3c619b7d6f8e625912adcaf10ae9296429af7e112d836f1b684bdd0c3ff30316
Pseudo Output
609285942b17d05c1e0d1c236c24a9af0c0ed7387299a9f62a4fac2a8e462a00
Key Image
c039202dea6620156390bc495e6dec881f1690ce24645efe373cbab4c803f147
Pseudo Output
922daeeeb28dd15da0f179993824719f8eaead59076e311cc763de31b1fddf1f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
f45d9064646efaade4c0425364183dbf9dc50bf18b5df7f0b16f384fce08d255
Commitment
dcd26c7a0426718ff71771df663aad4e86d41f5a9850f8baaf148d1f2dc5434c
Range Proof
672 bytes (Bulletproof)
Memo
7e5435952cd7b73bbc61fcb1e9468703e2da572d845b368cc7fb43c09999ac0075e9346f621288e3df871576f18c81f6dc46ef07ad557aab00034d3c629b3023644eda56f0f7865799e080079e667150797a822eeae75863bbfd3c9d5b271e39b1f2fec55fcb333cc1eac7e88b5550158ea2d813fe74d9f42287edf62ee32ebf (encrypted)
Stealth Address
729ff99e60b41ffd2b32de7182f26ae57ea8e55bfc5fce45fefbee8ac4556c4c
Commitment
22a72fcc5d2659752b6cc9fa1a7b236503eedccf34312e78edd7c37d92991164
Range Proof
672 bytes (Bulletproof)
Memo
78f283e4e29fcae789cfac2717fdf470500963d913004f47415cf85021d3225088d569f16d3a0c6feb17e23a230ba618594fbf62bf4cc4c50050bbba6a1be963148b101da85a2b01b2e100e3a4ed7a87ff37957edf9d2bd66f3caff6da282847daf77bbc8ede982e667d8fce42a29f3135253426285752fde638171952474205 (encrypted)