# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
16326698f580bbf6d5891e622bbb0b9fcb8111ffcf2f515ecea9cbdcd3e64222
Pseudo Output
ba44e680eba41ce3864ef6a6cc0bd4f7dd173d7b44dc874e58599f58c3bd387b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa415342793ef691fd8022cee4fe7d86ee0440f9b028ddc3cc1705cabfe94d27
Commitment
cc9b1cb41050492e34649496080e6885d7e1430a471d199001c2e1deff93454c
Range Proof
672 bytes (Bulletproof)
Memo
d2ce71779386aaca91e8ced63ad043a64aa3c704474b292cd0469d1fca513fbbb4a39ede487e5ba9ff3cd6aa41f36e6d2c8b492644d875193793e41796d40ecb4b46c1f24307c42905a4b9b14984d37c724ac631b93e4ee0cb736dc33a1ec8f45a490ddabec22c7ccd086a999236c60d69b6cfc00b7cd471cfd5923c9640c03c (encrypted)
Stealth Address
602bf3073061eadc3f6ea197b069141f655650527ee53a0b8d9700b432de2547
Commitment
b60014101fcb078f72de80d2747aec10d7a17cca82d9057b4d220d766129c038
Range Proof
672 bytes (Bulletproof)
Memo
e9ea180596fbd4801232b842d2435240a4103f85aee64eb44c4c25f81696e62048d7fd4fce9eae440ed018fe85dae71ffdf0c5c412beed8bf89eb9be9bc0669a90be723092ffcd58b3df3af4c29fe8c992f0242d4ce1862d8a14be1041f367b4c62e6db285216c09c3f3ed23c0b09e33ab676e2d63ee654e1ceee4b1ef1b3677 (encrypted)
Stealth Address
aa699f5c45b29fb4f2216d5ef6b2f4e2171550c20702c4a3bd04e9b65ded103f
Commitment
7cec76e5bccd82b0994b93278b28589a107994bf6c9f14649bdb68dabe83025d
Range Proof
672 bytes (Bulletproof)
Memo
ef43e438f5e38807d3baeb8bae2d21b8c0b5fb757e97371fe176a34f4eb09ca2c7c1215334726fe290812891e53b559a2e6248469ee8cefb51c48a006979aa28beb027fbe7d57483305e525a03deed566c296d8c27c677dbddf350baef33d6c4f5dcfddb5b8a20cb19e8163b552908ff56693ea7934d1f281b0b4ab32ad6270f (encrypted)