# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
bc78dc8f7b54fe15b31fc4536101461a8687675177fd688b903e0070a45be20c
Pseudo Output
a8c3fe245291c5874fe10419b73e7090d362fd28847f1418462ca6823d670304
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30ec71a1dc7fce069a8e235b48ba883cdcecba9e7b05296535978c50f42c0216
Commitment
c8c4c1684ae308ce7d081855ad98ee6631353a7a71c9394f0cd0259c4429187b
Range Proof
672 bytes (Bulletproof)
Memo
82c6979250c3207e8ec6e74bc5a3814a46fcb402eda0df7879f97facaa48c67f0a423a757fb3110397a6e959a56a47ff5b1a21fff9fc7c10f33ff7e0ad47f82658f32544fd95f7960e74f00eddf9597195c3374605659872aa206d049f7a2aa6395ddf18fed66100d2897c291dd4fb091618690281b29a897877e7e57f26b76d (encrypted)
Stealth Address
a4585eb389145efd72c05996bb2327a12873fa1f2629abbf1542706a97a5a671
Commitment
16f417ea2d7c7660cad42580430e491fb8bbd41ed82a9e396e141dc7716d566f
Range Proof
672 bytes (Bulletproof)
Memo
852dfda73e189075afafb3e35e5fdfc3a3813b990fd3d0ab8a3248c0754ad05e970a2970e304ada13875e5714b2a06cec3b139d4d3b48d1becead2fd4c35df970b06b005a903571f8ad24ef08d39e17dc5bef890280618d6ddc00f05865ff2504d0046422f6cbb59867d91e1b5d926aa33037ecd365f656cce0a7935ba583908 (encrypted)