# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
66e0c1066735ec1fe78914d5555eb7fb02035605794e3ad3f3ded55ead35b63d
Pseudo Output
b893d5c92b7963c41c603498f5e06ac866b3c892f77bb6b53403c9b43eb2f743
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
0834a71114bf952295a35fd9d8a988efe66218224b5829e070f9ead879da0338
Commitment
fca438850b7541acad4df036605c7a01203bbe55b23c7e70e5b790b1d372c23b
Range Proof
672 bytes (Bulletproof)
Memo
0c8e4955f48512b0d10debc4e6b691a15e041457114993e31c73e7a194dd4f397f2b44c97aa854d6ee6b8464ace7637e4f677a2d093d5f115b48de86bc482e98416dea41f6ea5a2b81428b2e83de4431bdcf770168891b41dc549e20fa92e8e39fb7c7c15b7973e3bcad33222e4e90fac6c5704b542a23d49c00a53f2f937036 (encrypted)
Stealth Address
a221455cbf7781b388aa9edd07f07474a0623a27b75f5f838210ac50044c0209
Commitment
c895619970517cc9614e6ea313cef05bcd4bc2de1925c87a4534a3eec49ce23e
Range Proof
672 bytes (Bulletproof)
Memo
69c5e7f4bb65dd1ae2b55e4140bff76635322e57e6d14d1d3f2786188e925d6ccf5b37bdeff521216915ffaf22a0dbbb45285772b558f0a3a2ff47c305be6faa94500a5bd9d38cc4a85006979c195531b6d9adb89ff4325d02e961661ee510519375d597d7e81834037a8e3c1893aa211098847e0258eee0986772285a35d8f2 (encrypted)