# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
302bfa35318bd9f045ff9925b137e78599c7aaafd448841428e3fe554df9665e
Pseudo Output
a82f27f890b09b166f5aebea598aab929d168ed662910c0d62d82fc5928ddb6a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
96b3232ee6ada43e258514ea890192d5b90acaed90ff80e7fe2a4e277b49b530
Commitment
02cceddf56e1bd1564d021353d11dda3395b259ad4417e8df2ceb44847ab6c29
Range Proof
672 bytes (Bulletproof)
Memo
b2365b21e772ce9bb6228653938ce197e874ba9e5f424eeb3c5c93090d63584998e79d030f6a1632767ae45671952d0e3cf19b722300ffa5af9d1e3c16b9485e56016d58e61e0e373498fa6cc5e1753d87e52c003820e30f24df0ec4f344c18657c9d14eb7e7dbdba367e7f33513fa4628f9ddbb6a8392d88ade5edb73b145f1 (encrypted)
Stealth Address
8a8d0b17cd39095528cb040a2928a403416c471d46338a7a2e5fd0ce4ee27a35
Commitment
3aeb42c289b493d2fe372303a6503ac6df20c9d81caae3dc9176735bb8647614
Range Proof
672 bytes (Bulletproof)
Memo
fed64ec0f5684bcc14b4ee2ee804be09512444aafb2eafb5713ba17c770810d4c7c1554c20d790ca242597dcc25d2af293da0000ca3196b6ca1c8a72f94666521ba35e13284c5a048bf3a0d22f6a7b019a8c7330603975a0ed773437d6ed5c5d68d2aed8b4c7141eb0513e499e8331a7762323d42816ac247ce766d019555dd3 (encrypted)