# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b4cc9494786d03a56877eaf02326d0a6a3de0f3b630ec1ce1716a51f5230d37f
Pseudo Output
421e39552fe4ef8d0a1916371f5511dee880994ee8f935db2da7dc0c2dc53b57
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
faaa99a939968239771aa115a947d7c9f82f6ede0b99352e93ea2b0a5425f837
Commitment
3a976a261ace9bcf68bd41dab94ebd150e79c1b3d5ec88b269593b850e837621
Range Proof
672 bytes (Bulletproof)
Memo
2f169b6231fe6f3011972de923fa6cfcbfdce86fb3546deb9bc61f9a74b19f2c2f4057a29c2d2357f1149895abb45870a90ab7341c49783fdc5d1cabf2f0016007f6d8e51d660ad5ae466282aea27882dff6e7a7376d729a646585acdab8195f8bfd7dda538efd9dc8e89d84feb0bb7b8f48f234e58638448192ce4088a9b9bb (encrypted)
Stealth Address
a6afff3b729d79fc09567103cd7b603243c5c1506b0dc7e60b13cf296c3c4900
Commitment
08bc28d733e19632065a6c6a36ef98aa6729bda8b756881119e63371697a350d
Range Proof
672 bytes (Bulletproof)
Memo
ea9fa3cd99e9272c7c88086cdbcf26ac11ca50ed039c0c33077716d3e54c75318fbf1afdf09a18903bfb07b10f2d06594ac2b4d023d88dbd77141e7d5e6c8266118d739808c66d274d3cbf132ea44efa783eed541580d638e1abe6bfdf80320708f4f1ad33aea1d4a721c63d5eb14902340753a72578999f0c2283ad3f547128 (encrypted)
Stealth Address
2e18028e053d53a7527b545eaaba90b78bd2993f226812bf1d1a23f8b8920014
Commitment
c472809ec1aa385acd044ac805a65b997fab82f58dca6c7df29bcf9d207b616a
Range Proof
672 bytes (Bulletproof)
Memo
e417df99f9c4fe07037db26c2fea2a0bff0444306ceff3f757cd5d4b97186b052ec1ebe0ca4f854f991aecd4d9f21d8eef3686d12eda80866243279acd38d080a1255a56b11ff0819fdef35cd750bed99de1d802c52655fa86819691a0a99d143dc045d5b0aa8f7c525ffd7bd360be230e466a662d493d67c27923e6faaedd63 (encrypted)