# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fc5ff2bd0367375e9a5edf98094ef9e6214ad1e928813e5b2e58ce085c2a055f
Pseudo Output
d8c677815c05815f51dbe16878b48492eba8664d73ebc4d61243ccda2b007721
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
465add026e4d80ca4e6cf79154e4969e6aafe5d33e04bf45e77bb680a83f2802
Commitment
062c2066bf6819cc10a359605f3d5611fcc57dbeec17f436c41d659a9f43ff11
Range Proof
672 bytes (Bulletproof)
Memo
cd95a04a885bb8883d357bda2aafe33874e010ca63f9a478a57a62a5f48bf67440be0781da6f5c8dd40c545048ba9d8fc91c906fb1d06e127cac0c5d50dd6fe1d7665052e235425480cdc64fe2b9eefde8f557fcfd86cfc036dd2edf31752950119d7068937c4501c314bb7b943b4eeea2f68b8975965935dd2bc149d4aee02f (encrypted)
Stealth Address
9619b7034727c39fe864730a233505d7d0caf238267fc363340f05097eb9f67c
Commitment
c8afea686d1ba362405e38f84582a98384aac8781b12744cea6f5999a7c3b516
Range Proof
672 bytes (Bulletproof)
Memo
7f9e081262b6461ed726a6a5f180ac0b433156ae86a596fb189dd2152c018efedc04236a71c606dd881d26b523f7dd7bb5ae3070ed567c71b86e1980de6e6bb3b36784549fc7b91d3b792c084aa1f253f86bd25e0c7c3fb5f3e41895cfeaf4586eee338537c152f4fa41f0d697e76e6a2426b86a63152d5702d2f63177673179 (encrypted)