# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec66efb26e3ef30eb0458d9d61208f2bb0b3c1cf00c3041ca62796f33607a009
Pseudo Output
b4c67ed5c39e92226c63f78f573130f2dcabec44b7264ab2596f02027e5bf16e
Key Image
a61d2fbb6a6c894c12524240bfc9222de67730c14811814d66b7584c1db0c818
Pseudo Output
16afe48769c86cdfd0c7940879b86b2c60fae61776bf34c447dbd2746083093c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b2d621027043d2ba7bcb6d5cd743cd027eca8e472dcc889a76e7bf4c2c5b1e55
Commitment
62f963adb7999e071886503cbe3362102d3ab62b6c95d570c6008e415b7ea961
Range Proof
672 bytes (Bulletproof)
Memo
840d6dc1ebd7edf23b1da3ca89fb2fa2646aba5ce23f8252c45862debefe41e00295aad1e8292bc47b2a639c91f8a8486eca5c5aefc9ef56159bc89ff0ceaeeb7203f3fe5551a85fad9e8e95e3bf97de50f9fe63f94d2f8819b61f320cdcec04f121418e3f433c15fda55a0456afaccf0a2eb026c77535262851d9093aff9e3b (encrypted)
Stealth Address
b0f5c226bcef91694d4f6cc9930ee7ed08e61dcaf98a13f49c576cd99d430574
Commitment
56339bb9db600bbd5983ba8d110cf969a43e54ff5ef95f5073a4d60cf52deb20
Range Proof
672 bytes (Bulletproof)
Memo
7619f15b02106305d1aa46d903c0bf627f273fd6e85c1a587c5af885c7f16af8e115723e3a298659e36ad88d9ef32a7b7e8d1961b3eb3b86a8d06bca362494302d7ea92f752a312549359b68f1ba6cf4f28b07c62da4ba47efc7e0dc3f419edd251b11a4c7b53c267e395b11a2c109575ac8d2497f06059ab7cc44bc3676a797 (encrypted)