# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
08e9630200b1af67a3a17fc1f2f33553739e59078b49ad68496e5e8b8ac62428
Pseudo Output
16318af52b74fb33a7daa3f20c8c3b8216228000c32cf707d37532b525a4453a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bca8bb30d9f88e670d931af4fe55f606a21af7c16a06aa823c684b24ba487a4a
Commitment
24afadbf7f4b6ae0782451b6ac533f6848a10eb7132c34a14734ba721d33cb46
Range Proof
672 bytes (Bulletproof)
Memo
fd45bc74189cd74f53f70638903e614190ddc02fffad3232a28be8e7e2be3d5b083611812be0db4400585eb5eae335b22159baca0b5ff8309c83adb7ea9917d8302e6367a4f4ece38a75489ac7e3c9dee61cb8d7acf672a25280a8866a9c9c71ca380a5bc8cf36243e8cb41ff5dfd4ac7aa6cd6465211cdc2eabedeb8a86f9e7 (encrypted)
Stealth Address
54b151f4e428a0298df4fd216c5c20f2ea6595155ff1b5ad7efce96bbd413310
Commitment
52f260b360650a8e0c2a8c9c4e3337302e43f233c97cae5dfd92b711e0a8c954
Range Proof
672 bytes (Bulletproof)
Memo
e9f108b191641e6463beeb503d584b0e0fa5a4f19eeaefd50a1776ef777303ed811adc0deeb91640311091e7cba2099241532ec1ec0dbb58ba9e36e62e1a732f7acdcd5ca4888ae892db444e5439f678c09bdd1f52fce3cdbf3067472c0328a082f50d76b51903e9aab1f7d1663953c0cf213e15e9e2ebb64e317991a24b972a (encrypted)