# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
94791b84759fc7af9326cf392932ccf0bedd38d119d1717a4b39f5c4637c7174
Pseudo Output
acd8ece7bbc52fc6bf945b937b3550011acc887206bc8d373f871d36826fa24c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
88d7129db898b3804782f445aa593d165e66c42e199f37be12af9828cc7a3e74
Commitment
b26c9e61b61b82246784d2744c271fa8e7dcab3719b71af2477810101be4bb19
Range Proof
672 bytes (Bulletproof)
Memo
8db62e5097814cdfedef44d759ebad2a4135529394dcf0f3a0ed4bd7170d6ca66372ae39d2bf775133c7d2fcf5e33508aa928925101e23209f2afe7c9f22f52e89bcb708757b28082626db870fdbae09041a178ff0fe66643776c1e2b2305181d9942efe46c18f03eb5f3b602ed53f35cbd8ad22dc460711057c75a32b275058 (encrypted)
Stealth Address
de08cda9ab91ca6e7fd1c96cd2ac9031e87b9b6f6fcbd9e9155bde89a972dc42
Commitment
8458241ddea75337fab938713f1fafa9be4447b2b40d609ca0612305beb42a52
Range Proof
672 bytes (Bulletproof)
Memo
34e6a746e6f64894ce1f1ac8d384de95eebf5c5bf2c158a68b7a256e637b6d2db065a0f650283fa0be81fe3b367991750c293dbffac3c315b2c3982ffb432aa0167e9820f14a03ad64d29b3634393b5191544ccf3013e5eb63c576594f651f217e67a41d044ef29c88d3d5b53e5bb551db42d7a3dfd13282fb3dec44970a67cf (encrypted)