# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7896be527b528e3ef5e98ea9dd52c4ee7943c912df2a2d5b608a252eaab89673
Pseudo Output
66808aa5c7a55c799d47e64174b99467a26fbebddc25829ae32ad3bf9de3ec43
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
24ba9f11ac042dca07c0b88ed954fc0ad2bb207ddced56ccf3d90fc9c164f667
Commitment
34e249a3177a11f09fe348abc7eb1b19e9900f92f78133a29b28f5d63753ed4a
Range Proof
672 bytes (Bulletproof)
Memo
8cfd4fbbfc21cbcbe31b33074b7942b9e0f81e7a1c3091417685ef62c709e9c1d5fb8fd33729ae224cfe74ee6db2cc610a7a38c4e746d82d71905d38259ab29533830590323ce9bedd0d160a952a413a718b4be30d7d36a174bcdaeffaecc7cd45bfed146b2c9558a5cdb48dfb34e1ab57463465af15080f0b71577f28dffabd (encrypted)
Stealth Address
9067a5bcf294b080524288554c2cc49815fa6622462592815d8c65adde36501c
Commitment
8e66fa808b25f5f394ff1326f7e5372ea95132a1fdb52a3673d97c180d32464f
Range Proof
672 bytes (Bulletproof)
Memo
59e6e560ffe31cafb1ff9ed265643f530ada00e17daa2f927cf2cbd87353fb3f6c5f60ac1d357cc40ee6b5497c35dd804e88eef25ef84dac5026de38bb106de86662d348dcd6c6cc584847f4b63e43f2d680e45c9e7991389d30ec8ad329c95668d98757fdae5bfd1861939214388602babe2dce65040b8ceeedcd36fb075d30 (encrypted)
Stealth Address
9a9115537b4fdde6e2b4c664714aa015eb080b939eb5e040e18a1c84735ca762
Commitment
0e9978e8a0b34d94d6cc51ae1ddc0602caa5cd0c5d2bc96c5429e224842bbd37
Range Proof
672 bytes (Bulletproof)
Memo
9aa7aebe29233c516d3d4ae32d07d0f087eff344de1f786ba42340a8cd6b7fc591ee7946097f45b212dca70bddab1c9369d7c30d13e1fe4d87ecbaa14ed9317e4cde322f11df6b42c5597b7ee9233bda545b36327795411653ae12245e264ca33175a5630dd954b16468e2a3b5dc341716e3ee598fdaa6cb3275a8b9fd915ed9 (encrypted)