# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60d28d8f09b089aae3610e14e3eee4b04b4ad747e46392b8e738b1e8477a9a37
Pseudo Output
d688c0c0baf966564fe97ec528383863f8c766f02ced8604fc40776f41bf8d4f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8ed510a6c39fce95d29e076fe0c06997585f5c861864352f0fcd56dd0c0ca971
Commitment
c614d3de51880da6c6e49c7d3c73289d894e95decaa8f484a1f850a80184e632
Range Proof
672 bytes (Bulletproof)
Memo
cbc53a0423f2b42369ee1e420df81c60a8a31be7b5e7541869325cd15e960191161be60c49ad9517760df00315787778ddf9944c8e4364e099d9dabed70e7051bad1c614d565c7775e00df1e985bf644cac1fca913f3efcf8df3b0fc93db72c8d24924ce3cd7a313727dbd8b4c2acf2080000f7f6906fc33030bc94dbfd721c2 (encrypted)
Stealth Address
1634ad37ac7b258f1222248db9ad92dfc7033e64933a2b49d09bf65e3d35e358
Commitment
5c58a321d049b3eb57edb97eeb09906641f1b19e59206e465edde2bd0985fb1a
Range Proof
672 bytes (Bulletproof)
Memo
dcc6416ce998e3071999a11422f31cb745c0ec01a1d51058b20a6c858092782811fa2b0282d9edaef448b1ba5b6bb5d1a49241b3806620622ba4ff044851c1a7235bdece209665974c07f15592a8580a963dddbf09946582a984ac0a0854a383fffdf3588cf31a3855014686c591d45923f7f8230a3cb28e4c0a53baf02d55aa (encrypted)