# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
86917972b00e40e5e9417e678adc13b75a13074eb7cd079e75e448b892d8e822
Pseudo Output
1ae70e583bd23257872d0d7c12564d297933e875327d7a31db646cfd86a7541f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
888b122dfff018bb2133b8c6713c7532b26c1a21aa5d06125c0b0a5235eed349
Commitment
de8fcab3c8b47a59148477cdbae7364bbfb6b5ef2d072ed468fc63bcae4fd60d
Range Proof
672 bytes (Bulletproof)
Memo
7a479d0663583aa6230ea07f5fe6eefa7c6bc1506c6eed1b23654876e8f9f9031d54cb7c38dddf7006b012ee1f2956763fa90e3639b02ad6e5f6dafc586c89cfc03fcf28d7586eb04115a98a53f995a86361e9c720237005dfeb8ede702c25c41d412f089ae4d6dff42da3a3b492613559da38d05e50ae6762a2ce7854a8c635 (encrypted)
Stealth Address
ee309b54be9d9941cca87631d0c045cfa216a079a5e5c1be652fb2268970af1d
Commitment
ba0cefca340c96f30f5eb46e02436981e7b7687be1a56b85dc5537a7816b686b
Range Proof
672 bytes (Bulletproof)
Memo
f882544ebc9823a5aeb06e6492316e9307bbfebc582f5da52ad8d44e1ae7f4a936d9966175dc762ac52adc8abc1e0dbfd07fe45db72caef07052301a3f1d5c5505bdf5924332d44ba2c5d189461521b7683e9082f5d24a2125d329f03629e609cd41b14b6927bb82a75d3b71e184ad23df71bba942b3df6666ae696bfb50bf08 (encrypted)