# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
30b54ee8eb7718b1e5ed7cea9300d72a6321a49baaa16f617bd691176872b745
Pseudo Output
dc649ab867ddc3be2d1c8ece34b3cf0430072b11ef97fea5585f0a276b23e566
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
8e289ae9737ab0a1a8fac73849315e3fbf0b6977c2e198be6707d075e3935b3a
Commitment
3a703af0aa2d65b1b68921605435059c9f1040e7fe8ade5e05e95ff35053321f
Range Proof
672 bytes (Bulletproof)
Memo
a2ed960421b7e18709b8431dc130b6420fc9b57f5be2dcb68a9ef2d0c7f7a11f78f99458e92963510bd4f436139798b7799c4a4a3d210d98a6153648a1e6a968e52922bdc248c10d9c940a21abb7a67f655906c25c33ce319d8a9112b1def7280eceed8b30d70330c4a2819c73a42b7d1ba84cdde1bfaa70fdf781f3d37b0abc (encrypted)
Stealth Address
b05a6a2b0acf52b3ca203df03866b1c69c1d5cdfd4094421e3afc54428ecdd5f
Commitment
f871c29b2a801eb1e88f2e645ecbdae47084c0295a19297f7ceb2ac7a5a9af3d
Range Proof
672 bytes (Bulletproof)
Memo
a6b3cb15302458da52c0bb5654cde936ec3b2bfe24c78a28b2ec284ece2d855d5ed9b339a5adec9118ccbdd5e9794904c222f317f81e0eda7e75e27e912231b4289c39b212c8373a2bf8ed8073aba417750d0c3926f0a62d1f59e12a65067dd60a2ecf00077e6d7bd098de2d37d4f8c316ac67a28017f94c5199305795111885 (encrypted)