# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
88b3efac9eed6eb026fc8f581a3b00b835fc71e031e4b22c70794b26666c5b67
Pseudo Output
aa1cb31e1aff6d64851e3eb953289b2787224d94e7249012b3d7f79a67d4fb5e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
da650e97820a2b8fc1b245ccd5fc3ea6b1baa7147906e8acaf25809cff66787d
Commitment
9c6fbdb6441bedb09ec30457b2f92e012e08f90e177f1fc171fd442d87ff8445
Range Proof
672 bytes (Bulletproof)
Memo
04f22c3540c3ad480a75f75e335c5d208fd2acc2743bc267c8f13eaf89f0b77e937af6ad220c7545e130d37cd3680f31c3b27e6f59f80a25819e57962cdeefb5dfe9abe4e919f47681a093cc301909febf2a9d19a8526b3a469cfb52eaeb2914241f0295aa35ac1eba8838ff514bb1c2c3e21c463def4ad615034bdd95131fd6 (encrypted)
Stealth Address
26598afff2d80f800f8e0053d22241d0c40446aa6a76a6747ffad429f40eca04
Commitment
be15705276f45459e25a421a1e3bc5e3275fa66ebfadbe18a7bc58ed01df5246
Range Proof
672 bytes (Bulletproof)
Memo
360e0763f5627f753edf6cf7b1c5d1f41bda561d2c69cafeaaca7f9bdb72b6de310e10a8a3de0cb10703837bae4bd6efe0ba90d6091bf2bd2a2d04353a823ac138975ca61436047312148cc026ab9c6d9cfe8076bace8577e82a04be13a6cfd2fb2d50bb7506e38c014dce24542776f2460ab392dda387205d23a9d190929a5e (encrypted)