# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
324df3ba177c725850087292c65891742630d412559760ed0a548bdca418377e
Pseudo Output
1451996544dd15c84995b1a13561664e56b1329797b5ca7dda896e21f23e1a41
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
faa00092f06f7cd1e0e0ef655dd5c978e5a41ee436a82a6bb4401e486164242f
Commitment
4281c888c01439605b35e35714fbe7ac49e3ca49134e0c630f55f4b970d8d81d
Range Proof
672 bytes (Bulletproof)
Memo
67c92c9dc0e8f33fb6fa526db7cced1f2788dc58f2b69421012e292985a3e98839126308a2db45a6068b05d84a7b781d68042f67e0303cff63e581eeb6f5c92da7cb20b46de45911cf17bda239ba7a3aba463736166836432fbe4e2ececc5158ea8359d4bcad2fc6b9c1eb2826d01f9541f25c6ef1ab790858064692c0749a96 (encrypted)
Stealth Address
1c8c04d8899db826b63833663971e2375f598142f26dc7c4970e9f7cfb618036
Commitment
0a087836172633e86862d5bde276dfe38466a84e0958d010b2d83196312b9d57
Range Proof
672 bytes (Bulletproof)
Memo
d5746f534fe67e0db7cd631624151fdc4f8432b3a621cf2817cec612940b131a51ded002363f728061c70cf1b72446ad212dd7d8b23cdef47b6145b1824190d9406a7284dafefa26ded4878ff44b5bd3fb8931e3a5db55d8156bec901304d1995bdee9d807c4e3244a80e61759011d191fe68f885c2bc120a9c42e24a9a30652 (encrypted)
Stealth Address
c84c1c5b0bde615f0d2b3a2877aa7358a33b37485fca6dc107ba4d0bfd3d7c42
Commitment
76ec1d6698475101b986f58ffa60ebb92c9ad5012213ee09686673fda59f9f6c
Range Proof
672 bytes (Bulletproof)
Memo
417ed44ff7debcbedf08154057496eb5dfab6ac0028e77e8447e09518d25343745b7107d78031a1b7bdec8d66e91b44a60996dad3e7342c42039754e9632e7de7ea3281653e2e8943eb9bc6521557d0022eb47efe90d58232f91a2635c2c1a2f42aa1b5f7215141ca2d37477ccd2faeef455d05f1812d0b236a0633239b5efea (encrypted)