# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
660287a896a988bc2d42dc0bce2e80aed8b010acc93bf695a83f9640a9885679
Pseudo Output
7eea62b97174f3497657a61ab9ab4d030b5973c9c1794ef61eb0e370bb7e250d
Key Image
20f19a0b89ec1ec48a14a3cb7d645aec22d419dda99e35255edcca8a5d326e3c
Pseudo Output
746b011a588cb7cb97da55c1e8eaafc4b4cf0e5bb59b084ac46642e09f087323
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
3a3ec448471f9a0b22b27da02634305c76aedd04bd96036eab815a9641d77020
Commitment
9202f6ae18a5240e31a74e2b94347cdf3f7dedb1ddc11684b0416354675ad644
Range Proof
672 bytes (Bulletproof)
Memo
2cfd6bb38eaa6c1bd7d5b16262138dd437d025605bca0706e95d86dfbb47f476106921041ff32fa59caf66166a1872089060dcabd32387b7d62e3feceb75e9648e88b6aad9042db9b9ad2b02391572eff80db9fdcfb3d33c4e4705e8178426ecb292b7605a2b1c956fbb6658e5879ae3fc0d7b55ab07b6ddfde6743ec098b8b3 (encrypted)
Stealth Address
123276b300fece24535145bbac2b6bd3c754d145f24c389a7e3014cd4e82ac00
Commitment
ec2009ae8e274afa8d876828e1f55f042785458d276c51c3ef85b35f6f0c4006
Range Proof
672 bytes (Bulletproof)
Memo
84e48c6aa59bed6aeb4bbe0148be536f0b60c2abe3474b46aafbb61538f4441fba2a85ec77b7bbfc92a34e8bd3821a6d12a3935b5e6416c8b4d4f90ce564a98404131c51dedb26e39ddc45de83db9c2406d23e112d0e95a26b040577726bc4e804d0efdd85f95d9db836c89138d8ed25dac5bd1f779882650e05802036dac1e0 (encrypted)