# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c24324cba2ba354fc5697200f0b80e3638b8ba08364c689fcdeecd19df5c0321
Pseudo Output
4cb0e828a72443333998b1cefe65f24be3e35e3b81f3887db529a98f2d41bc4b
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
d08478f9a3dfc7d6233ed7667a33c6274ac838eadc1f84a3d8b6b0aa274f293c
Commitment
ba21bba88ee3fc170942c82863ea44b7116c0d5d5c961775fe1249e6d762fd65
Range Proof
672 bytes (Bulletproof)
Memo
0be00b1a30422bca3baaeca7504bf9364ab7fe2993a742e9496225ed2fe6cd846decac9f5d4cb939930d7d71ab1c88a945284895b7498470b80110f5abe268e45fdaa072e4b2c471d01dab5745950a499cae1a62f60874063d90368a1d65dbf5239b52fce3b2b14420f25570d800ac071301c12ff9ad4fc2687020f0701111a7 (encrypted)
Stealth Address
be179e2b801d4ef196335e0015ea8c0fdbe6ec10a8d00959c43660284faca711
Commitment
eeeffe89aa3722f56b3c2cd535f53506ce612d95dc3b425d54010853f1b4e316
Range Proof
672 bytes (Bulletproof)
Memo
58673c8fdf9d7d56edd39a69fe76c899919bbc75007c94af1300219d151bff6c369523768b48b41c162276910780649f606b8e6721bfd46d0e3c130eba7f75f86cef86db24b645bb9060942411352c8f1efe5d950211e00ce25ca5e2c1c4d48267c954a87dc209e1e0b6fddf508192f108b8b59a594adeb87dd3a82747a5e03d (encrypted)