# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d693b095a33426a2cbe23fd1c738aaef423f8289f755f51d5c9525f22974d829
Pseudo Output
14c27e184e8fcf5f2100c91d96f9ca0f2291bd2ddaa8bd888c624732623d251c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30ba4e51e1f07daf2fb844fd6aa484a36c2acd1fa4ad11294725653e04c97c5d
Commitment
20a9f732902dcd811f52267b42e468fc18869591e6a41fb5a868e4a90c91596a
Range Proof
672 bytes (Bulletproof)
Memo
808d2812b8ced6526421ed2ce8e001c54c68ff6b21f8e57344e51ad0b200d761b4a9d6c681d8f861b155156926bd44bf2a0def7993f936fbb6ff74616388ac6fd8369004f16995c67e64a713bfc06d0fdea59ab4dd28d27806d39379f9282eb6ce1bafbb47f3049679bfa629e704efba06f9daf9cfc46c656f222d784107fe0c (encrypted)
Stealth Address
6a7877509bd5ddeef9365a8f6673af8a29955a1d7b2bdfdff225bc08e88c6156
Commitment
7ce64af880034d74133f8611196cf7dbea0671ac50b757f9740849f67547b334
Range Proof
672 bytes (Bulletproof)
Memo
220e68bb99dc75f92ab15ec1489e04a3f4b52057518cc51b17dce262a857e7e23ff8b3a3328bc5ac051f72099328004241425d554b08cf715ddade9068af7b1c0805c3925f091abb82750dfb4739ba7bca648cc7f1ec47d120b72e35d92e52cdc489eb3a4c6ba7af0f43342deb16627bf740116153be8233a523f38c420d6c2a (encrypted)
Stealth Address
841cb38ee4d103783de0f5e81c65ae3a2a371624e466471b3bada0a70179b544
Commitment
74d74ac21039634551ef98ef728b774e1b2c3889550350aa326004a7332d1f0b
Range Proof
672 bytes (Bulletproof)
Memo
f0bae35ba89aff7f1d2c948a66e86c1cb5ede798f6066f2a83bd8699c48c86f4e90c6355c4900ae03ef5cb344bfac51ccc415093bdd4f9dfb60aee66b0cdd162baf613198305e855fa5028b7b7ea1579d19cd1716b48222a226a3de744136db386648ed74104b8332aeb1fd97b139eb891cfdafd600ad223ac2ecbf75a0d19d5 (encrypted)