# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
9a89fa43bb8be868f82ee6fa29148fe6f436fd841b61b341e8ae6c48688f5e07
Pseudo Output
463723ed3bf21518eb9913f7c2f3acab4fa77a63ec6b0779212b7c52e4b6f554
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
24c05b611b968226fed5642b6f803ae6a81caa7db82472d5f40d72d279ea276f
Commitment
7ab70cb808809ce88fd852275a559d5b8da21417fb48ba1cb889499e8a4a8929
Range Proof
672 bytes (Bulletproof)
Memo
929c4802e5c3eb9ca04a024fc3bfba6311c5765424162a0cf7cdad1dde274bf09718e801debc2b667077d8b191b271cd4d7c9beea52bfd4bc79b18fd3cb48abd2f45c88df2de0e2a6a19f74f01363e6029284cd8ba2ccfaad2378e54c1db6b9a46f1274c66353a397c49a9f97452c36494bfad125660501762f124de82bf5f98 (encrypted)
Stealth Address
44955b0016d06144042d0fcd165cefbf1f3bcd71e355d331322441d5dbd62b41
Commitment
9c8b902aa9605010a990b83cb68d657022ca9dad90e886ef1da4238eebbc2435
Range Proof
672 bytes (Bulletproof)
Memo
9831c03c2fe8814b97ca1310f976811cab49a5d2507d6fad6b480bf27cec18fd4d6765567b13c819894c83ad1ececad9ea5b47b91704c1621c17450510e293948c52eb33e96b17abe527f64d816994ae0ef54b224eee30d69e7345bf409b3acb24df107f9236fbbdbc53ede56ec8d9a341b96fd2f99570e491d14d468c636c32 (encrypted)