# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
688be96a1e6cc9fe2b2afe262be2b8927742efab99885e42674e6417bb80f17e
Pseudo Output
36f07629086f62f02ccb352645bdf4524ee31263025239dc9919d69210d6ab07
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30effe9e3db600c3634697d48283ffcba479d54c9e73b1a85b157a2b5624005c
Commitment
949e33ce7b02274f220573015ff6f2f37b0828ffecce8b6f97dd2abf56766f7b
Range Proof
672 bytes (Bulletproof)
Memo
fb0bde8bcc5908d646551543c2a55bf50a58dc62b49b6ec3a0c4912c648788391f4e81482c2ecf5793480b1b1cb8f281e1857b7e528130c141d051eea12fe21eb0f4bc52bd6e7fc59976629bf5e83ce0a90059e7c43a3a1a380b6a82be287d967dbac0b9200648f85a1f46aec705ca8dad39431f57f5c58f354d50f43d3c8cdb (encrypted)
Stealth Address
464dca257d7eb86fffef4922e485656249d2b4ff9c67c62167ceb5c435d87161
Commitment
a87c5a7bfda1df085a6ce78644f10969c64abacc6f8d18bafae5b3f4cbc02d20
Range Proof
672 bytes (Bulletproof)
Memo
88c6d2ae899ca120b8e4347c3d3f63c66b74502d46e68601b507a2cf0aee9a804fac50c62735e9db3c4707ac3322f5572ece0bae598339b3403cf70b0aafb51d5a99f0434ac48cae1f0d92326891da4407b77f7dc8be511fd1b5e35bc6c7e1f9094e78b6ae225955063cef141faad00c79f097e4a89a2a610c28db83b0a15ab5 (encrypted)
Stealth Address
02d39071ddb5e32ce497284dea8a63d0cf18b717a133777409f4be601c14f70a
Commitment
869c80cd579b927c2ae8375994e6b08d2703c14d1f8bc81b70dc503c391af628
Range Proof
672 bytes (Bulletproof)
Memo
6074596875ed6352af0a2031fce133cdc357cc016991c7fb654dacf438e29259bb314a3132bfbecac7f37eea65aec4cbec0798cac572fbb04e2f1aadcff2ac60737b6ba9a7cb27de6fceac892f3701ecd7d5b7eaf586ce042297d9a6ed56c8835690909d4d85cf4f9d7b52307f0205a06cdbec430ccfa624cb5d0ef723a55613 (encrypted)