# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
2a484b77056ada64668055bb0881b5f04bbe89da66ad0f509b7f60c7f16dd22e
Pseudo Output
d25829efe1e92f3c665579aaab97fe438855d979f325ae2c01d4eb0cdfd48756
Key Image
ae9b805fc3361cd89181555c6075e5d7b6ac24181d9c7e7c6f57179f77115e63
Pseudo Output
2281a27537bde89ca6a38fad97dcd525015fbd21301a5b1a6b6b4d758acf1a1a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
faa4cb05716efd5f5c362de48ca07e5e7fd4e73e6fb0e4cf03a323290fc6b915
Commitment
d2ccf097c763b72dc0e78b29b678825f1942e3723af5b3ef1fd2284a3730ec70
Range Proof
672 bytes (Bulletproof)
Memo
2068829592a3e0804cb8646183052872f1c607bc840987c4379c52699497c467583d4af98a3beba9c4977653ace0d7c9c5dc90f686dd0599b8a589a2307ce10f09c9f49eb0e1e82d4dc9bcc45d939fb34a9ba57aed90d2d59625a4e7a97bf0029254c9dd0cd34b74ad5ccac6e0a00887dd01fb961a90f640e6f76a4591684b0f (encrypted)
Stealth Address
e2882e4bdcee7a8185dfe4396d77f86f61f9001b87d0b7ef4fa66547ce6bee50
Commitment
ac7e826fd70831000235d6c45440462c11669f4108d8ff385c3c732d3c992436
Range Proof
672 bytes (Bulletproof)
Memo
9ed665de747dd97b74017ed2bb026a9ecb9f7d00377f259a7efef241e5c97e6cb77884b9f35073d38f6641e182bbf2f8bfcc68fa90b08525fb6a838d0c7146c99fd154e6f4a18a52d766f72dc4f62f9dca8f4180b61acacba59d54a5d2cff88f24614a3628bc292f774013651cef746cc033f9e2f1526d5c4937340d14975db2 (encrypted)