# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
4ad5c27c638a6a3188d738c7677ca69a8aa6f7c9aec995fbf256a21930e29a65
Pseudo Output
feaebe1caffb9eab0caca679c6b98555b9590ab13e65c1906e5195138fa59372
Key Image
02ebc0ae9b26d000b1410f3f4f1675677d465c32fb8141dec4bcedcb7c452f2a
Pseudo Output
06d0aec3f7b941ac1362203288fa2c8ff629891bf0a6d5bda863d797774a4d4e
Key Image
565895f7190cb5c106e7a3fe32bc7ccc20d24d09a297bb2daea55fbc53f9fd68
Pseudo Output
d88379cc05e8985f16eafea98a0c9c5a85aab80e3dc2c5bd97e0f822e445764e
Key Image
8cede0118067f2e5772e9ec3259ea8e1edd5e050e19b08e868aeb3b9fb689e56
Pseudo Output
844093245c50c97f69ad66b9c26910540d6c047c61b5e6f085009884af894b6a
Key Image
3a3f1d03a6ba7cb7bebb534d2aab3a174a127f8c9c2b8c7c7a4fa051b87b5b61
Pseudo Output
3ccc70cf8848593c9e52523bf53ef01f4a56fa4fefa2a878a0040e31feaee06f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
389daeaaf3af1ebd13bf65d118a4db0200fcedf74cc3ac0483da312964e3444d
Commitment
824ae3f3a65fcc5d55ca8e8c7f804f3bed63cbe12ab181f5ac1ed82fc80b0765
Range Proof
672 bytes (Bulletproof)
Memo
8c9899400f0b40c3a9ca54a90f0b5b6a487fdfd5cf044d9a03044429d580612815436fc9ca28c65b7ea383f9833b0d40f88dc92cb849e946069606e14838cdacd534d405c0af22692238e6486580cf2668acd1a7e265b6ccc05c8ff09fda11f20060045cb57888caf75f48fe9a02b1c90d0f719c9fc3154eb425d88d71d50a6f (encrypted)
Stealth Address
6e5e7c9cd0c107384184983094f430d797856463cf84bb57ce5528a1f7441f50
Commitment
dac9342f24630c888f40b4ab97950c465df882661fb42a5121764b69e620d97d
Range Proof
672 bytes (Bulletproof)
Memo
136d8875542f3fbd79cdf4a718d483a4350137ae0f26fc6c704c8000c74a367299adca18985c50fbc8b050baf3d5f70a3c48ac73f18df913bb1622a52ee56bccf223cce97001bc3ab9cf45ec4ec12744d2de66447e7e0976a74da7e6da32082a517de9573ed5c1501f797e6e35dbfbe3098bd429c389167eb9b570dc1489913b (encrypted)