# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d664272e087d5db4c6b5874d7bfdd90c6f59a83aeff5bd88f2f6657c04f2ab7f
Pseudo Output
589feb6782abe77d5636293f3633823bfeaa381545862bedff9fcf9f01d82264
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
24dbb37d8ed6fa6cb83eba7a9facc7995297ea3a43e910dd978f379997824a28
Commitment
28e7eb6a013eecdfad61e0792f8bac228b1be2849f6d9cbb6e33be84603d1341
Range Proof
672 bytes (Bulletproof)
Memo
5bcc6f9936fe751fd55f9919704f9874fe70f7ef1f6efba6d92a5b67397cd413a534ad703bfd2281baf0a9ce0ea53a116b40737d42bea86ea7e8185af0b8b2b938edfc3377ff6e366dcd92acb6a1955141c7884bc8db925f15887e8cf660a645a27fb3ebbf7e3c667d4b3f9c760c701d9a390fdc537c56ccb06b650fbab0a15b (encrypted)
Stealth Address
44d2c716ce50b85a8542a5d297983efed72645d506a9ffa1e4e27af670aed967
Commitment
487055550004cd5acf0dc3aea4519049d3d7df606688faddcd270eed5cf10422
Range Proof
672 bytes (Bulletproof)
Memo
0da69faed57c156281d4cbbde78fe59cee133fb49c882d952a7c94273c85c97c6aa33f920bde0991c306f240db31784a0ff19755ae1e13d0064b346380ad7dbe9c16140d1b0766a40e289ec3cfc55871fa749be7ec69b93441ccf73a191ef6b98b2362dd7e09910ff76ea2b842e2ffbe9c429eec63d9f8bacdee049469a88927 (encrypted)
Stealth Address
de00d1792c378826a28e75c3b52e0bbd31d359e45f2d1d7cbbfb2f50cad29a44
Commitment
3a7437a960f042b5315b1ac7508fa1aefd21d8a96d425af1e6599e098f44d850
Range Proof
672 bytes (Bulletproof)
Memo
c8c39d964cd64bc1d3f071ed97a21223c8a615a8f6b8261f3d6f52b7d2a37f7cdc54700756b489aa59882729fd1c5863be224e63884c25989a765ce70640a9e0f61d7b490ad4c78a4124b4612a19dced6fad95c8ce88f06ce4fddcdf104d4d9556fc18b9b272d88c4188f7b8b050835e2a2deb01d42e52c47436903b24209808 (encrypted)