# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fe6e168451f9628a8c70c64725796fa24e169efca10f615449d5d48133494e19
Pseudo Output
b2b9c51a6f345f7b14f6c2ecc36e34d327da90b4e8b66e45b271c2940a733749
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
40267bafdeae1304db127f25730a47b6a6fdb1129c1b93fd6d111a32fb68f70b
Commitment
d08d42dd8089ecd3c14742f648afb23d167489242b183862b9728e6601faa770
Range Proof
672 bytes (Bulletproof)
Memo
8abf1c635fae93b63371b330d35c71e7ad24d4c28238f62eaeb1db22b00313d94f23b610c51354244bd2ab8d033fd91e8aaf7331155bef5a10f84c987f0b5b9ff273e5134f3018d2f377d5e1f4053e5249501591322dddc86e777da9ee14d345d4275b5783d1da7d8c0344137d46ead919b50dc5adef090f3180444625bdf2f4 (encrypted)
Stealth Address
2863bc4d596f2e5568064f84ee0bf0e9646ed0df72042700afdc6e7e67229a14
Commitment
9ce9d071fdad7a4d6b465095b937004e82e63f6577f3b7834ec72734e609396a
Range Proof
672 bytes (Bulletproof)
Memo
f43ed86573d64bfcdb49bdc57bbacb84d774654cdde7f67f8abc532b07e2cb988f6bebb08525184663d1cc3836595111d50cd2bcc72af0986eeba38406e3c9ef50bc173ef28f35f63aa85f4f6295d36b3867930688c256b43032c2bec85ccdb07145544d8a3040b6399cb89701eb8202ca3b28c8ed51e7de2be9cdee06cbc277 (encrypted)