# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7829eb3071fc5e3768ad2e64d1be4a9ff12ac514e32f71f024e30ae10d3f6f42
Pseudo Output
984ae44c8c4c0fdab03e860aa46d0b3d4efb29a44bd2aab38fa5017878610e14
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
24a7e166597170edb5205a459cb38c924599fd7c75a5ce9c3bb1188f64cc7960
Commitment
329c760c675601c63987ee3de2ee47fb567184c3fd4609fdba1b1230f2014613
Range Proof
672 bytes (Bulletproof)
Memo
f8da5a274b5b80caee60520923a704df8c0f34a5f1e74beb9fb8654ed2a9a89011b00078c1eba2c69bfe75eda921519f3510dfb7ea0776a0e554879979d233015b7abc5e3abf237b928319490eafe8c31bf393434f1f7f827f7a440d53bccd17182e6b6d1caa0e93d3218cb96ae5b83a4cc21e97acaf515184fcb6385a35ae8b (encrypted)
Stealth Address
ae5e3638e9084bb0b9be0eaedf6dbc352dcd5cfa6ac1ff0a0bab928075b60705
Commitment
7e305c2e1fbd546544d2b77758b87e7c44b3934665471f80818925087936133f
Range Proof
672 bytes (Bulletproof)
Memo
bb24466b1fca841f92840fd7be8794c879d91e5532b38de19ab87d102abb25e5214d1f1ab7c9601f2e0dbf48ed1e5de90fbdfd34b295535eede0524dda228bd2a87bc372832864b0039042611730a545407990a21b1e8576abc9f77a06a461e183ef4bfae9ce685a719e275862b13dae478004403265c891bc89fa21b81d2f9e (encrypted)
Stealth Address
2a7ed6a540e1f03b3b9286bef9aff1fa0a23668ba58d2f92ee278b20b5d77078
Commitment
2676403dd4ae971074cb5d28c0a798b0845cbbee9d6591e6022d539dfcc40021
Range Proof
672 bytes (Bulletproof)
Memo
2470376ac151155bbfb56804d1b4221bae03f76088077d15dc87c2ac5f93cfbebc6237a63746e9a12739d185657fc073b879133f5df45c811d6f77cf8714f73a6670ac6829ef3a67b3f458878e2307738868dfc3148baecbc4eb56e5a47894a7a4e2061818090c5396c80220bcea1986325352068934cc7a7561eece8fc65d89 (encrypted)