# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
3eebc91b659ac45d7b3699b9607ea71d71381f4391185432bb06df688b97b804
Pseudo Output
d2be9d7169f086a21e9271f2eb8880a70f9108c04e1513d81eba6506a0595719
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
24675de36d41cd2cdba69a6c39ca93e8728f6efa36f4f15858fda54baf212716
Commitment
541299801f106a543ac3c022e6f4a188be78fbbf90110fbdae6f4a47805fca31
Range Proof
672 bytes (Bulletproof)
Memo
b74999b75f8b9a4d7947f2acc543041cd7078b7ddd21b0ffc769eda47b66f9dd3e196034aec0b7683a5cc0ba385a0aad0871301c486a759434376e8d49e535a44efcd6e935c55df10e83c8278667920297e0ee89c409b5dc06c952b5ceef2befb9a11ec4dc95e4907be1fde37e75b02d65639140b42ff56c5ae154895a46e0c7 (encrypted)
Stealth Address
ac4c90af4ac299aefed125ebf5fab3da8c4ebafdc121d33689111617114cd725
Commitment
a220a099a08a616cf854ad56a8ffa999d5e26df97ea0ec1347de9a6cb5acf505
Range Proof
672 bytes (Bulletproof)
Memo
e1f05fcc8ee46cd8615b6c3f21fada6dab759981d975a37c51ee301ad2964fca2c7e04e8f4e9a7965bd542bfdae78dcb1cb7b260ab8f1ab2ab829f5dd1d0de8b71a8e36054b2f58ec30ca4d827e3535739a858edd3ff234cca53ce2489269a8dfa97fd55fa7192febcea007645d665f2c054183dbb588b47fa7f563f5bbcd197 (encrypted)
Stealth Address
7afb2c14270b07971960d7f764eac243fd8b0bb4278fc67ae0bfd514b49b8049
Commitment
2ee134612932aeb9b16b14a89f3ae954437101960c1ea2b0db50bf75c112e91f
Range Proof
672 bytes (Bulletproof)
Memo
2c2160367e9b59628ad038968c790d8eecfced3051c0785b3f87f0969d5ccb8d515f8b756a31920ec28caab4744ecf510002dc28dca33d65cc1915e52765cc41fcb623de69ed8c1e9de31a40f810a1cbba25d86858e8456688ec7687c83fb1cd273e9ac67aa110a115efd97ce929147f84cd10d9c3ab06bcbbe1a93ee8585984 (encrypted)