# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
da7aa116220f1ecec95b44468edc03dd02023babdcc6150795e3d78f00c0d109
Pseudo Output
78c77a425d7266dfafebd34136fb69de959baf41fb00fa8d386ab5409759be66
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8626021748c05aa7e41dbc2fe5a9cb71c24aa0fcb2327e8ff27a777660c50248
Commitment
08320461fbe26b40975adce3cc300121881aade2c32febba2640a87527d5ff4d
Range Proof
672 bytes (Bulletproof)
Memo
6a9c0aa8357675ac9f5d7d421312de875c2b5389a8bbdb7358421f675a6e19bd7538eca1713621cefb963e84462070cd3801474f60f12c942a3b4011ae0be034866c4d54acfb7bc14676d34c9d5bc826719de6bbb7c0e3a1ed07e26cba347ee5a23a1decd68a3b7d1d0203ef027b69a8e2939bbb385ed2e73922f555b211339a (encrypted)
Stealth Address
aaeadc0c41e6e8479fc02efecab5a2982f1f83cec13a08094c72e3833ee6384b
Commitment
2a3732abfde67373a77ac3684e8101a3037e6427c0bc3b66ea257f6f5907c624
Range Proof
672 bytes (Bulletproof)
Memo
0e510ab690cd88d16edd0025cdea5258c5f72b467460990f8f8b0bfc52c8572bac7d433d0104e13e959d39d77d3cd7b0ff1b4998416bf76017a490123349080fd7fe72c50235e0682709136b300bcbd91c340384a8a918d539b92663e78a1383f6f9702ab4849823c38557961098517e564d24abb588d4f8b197d41bb6d828b0 (encrypted)