# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
24e4afea2be14c5d0b956e2591b952aec0f0765e50a5b3c26eb12834f2f9142f
Pseudo Output
d088bfdf1ca7e87d0281ce95f5e176a28ccb9748176e7e451a8a3df202f36540
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
caeae3e82fc73eb3b9e5e96d224d1a403054710c0b778cd0f2f19fee43f37444
Commitment
a24f610438db2a545f16664b4267b4bbac6c9e522cb3355fbdd6ce52474c5e4c
Range Proof
672 bytes (Bulletproof)
Memo
b749145372fc79e638a2f9945ab38b8f4f1d974cde25dc9bfa9e7c5a01c283100178a13019a43c8ba8154b25ddfdcb9b94b15f41ae1d92d9222b3d8225f3b53931d8f8c12afa59db916bef2f8b073050bc9b69178523a4a3adb716284af080aad2ab76038d9a0fb57a42840d8eebd1d0fbddd7763fab3d94ae5e1523e8e46cf3 (encrypted)
Stealth Address
70b8156b1a746c709bfb84daca90fb1c187e32be9cf334c97c283a7f1cc8c55d
Commitment
3a1ced7099d7d28d18926addd9b961e55735beffff2150eb59bcbaf76b820f5d
Range Proof
672 bytes (Bulletproof)
Memo
98bde9ef9bb26a3bfe1dc2db8660b64a6fb9c29a3bf67380e69f444d84101e4443faec7eb941b285f819ed5ab2d779620051ee8afd7e4e6322c299e88e38014c6742469bbc2bae90064da8778038eb9d971a8fd75312166ee9cc4651dc57b4d9e81445303c23de2cc435cad2264b430d228639b46cdd48dbea17be93c2300f73 (encrypted)