# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
24466a73e87c86dfce07a18267a72ba57a51a2624d752849007dfba2debe555a
Pseudo Output
00b3b7837356d38b1bde46aa02dd0c8e0d2034ca2bd256b2d2ddb3bc5bcbe547
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
ba6291bc99bd5e25552b74584840b91aadc6ba98cf032dbb9ed6fa60715ef329
Commitment
36f513ddfb73afe41de03ac27466f7f3dde96e36b6b2a9676953cc54daa6b34f
Range Proof
672 bytes (Bulletproof)
Memo
6a782832399a9aa20026579e30b9440d15a33d2aca60a634a37bc7768af55fd57a253ccb35b16bbc38b68d7a45828e23a6181703a31164f5daa3532272a0cbafb35a575629668264a9e00b1eec3d79db92e68e0321f90a2e42c9c9386067bd6080c9ac8cf083e3ea2a013d041612a36559f2a04fd85bc5655bd4595c4d3d5c39 (encrypted)
Stealth Address
e8b59de9987afbc7e064e302060586296d8ef54e39ba111a9f3960bbd5843f15
Commitment
2cda59507469abbf795f819645dc62f14639ecb3e999329f514ab76c1942d739
Range Proof
672 bytes (Bulletproof)
Memo
d9abd86ee6c39254da6b87c15ba149379027e6bfec6f33611c819944718530b164f212cf82e34eb3799143ddf6bd5d141138b6d9e39df562d211e9701df0821fd8a1698816a4fc60808e407a5b64a3ae04ed72bb455260d71f69bed7d65d02f996d0cf3f098da8912425eeea9b5507000662eb132fed651451304f7bd3d11239 (encrypted)
Stealth Address
2257c87cadda96c15c3aff264fba3b2b10bc40a99774b71be400401c1face379
Commitment
dac8793cde2f70241164d42ba40d0edbb5e3b676374d805fa97635060736eb7b
Range Proof
672 bytes (Bulletproof)
Memo
fdfce9239bce507068abf076631dc91bbf98bd9dffdc0988a196f0865d95728d1f68f083e7cb9bf08ee448e1a832548987342eec92cbe7a5a9df23f7a2f5ee34c8ceb8cdde3d5792eb72c5f82328809f45c54a3964c60e2ce9b55a3f5e9d55afe38d941f50961a0520c1cfb0793280154cd28733f748892db6cd8bf172c917e1 (encrypted)