# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
aa4f40ddb77181a0d3353744d2f46d7619bbf4a5b328ca988fd915d5d34c6c68
Pseudo Output
e402af66e0455aecfcf72a9e73650b00ee65fe078c996ec8c50ffb54ea168d0e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30be7c34c8e849b166963b4cd208f6403c879759247fc19d712ae09dcc634932
Commitment
26722bce5cdd89f20690435a31330598439da21a4a5482f64da4e4900472846e
Range Proof
672 bytes (Bulletproof)
Memo
bef7fbe27aaf3a3adc9963b065fc03ea7b960defc131b1d401c5a86e332ac18cf24cb2dc242f99cc7c898d37ee51c2b875e03bbd6857062f815b6d3d17f0914b40774e28dd27987747bd5ec31d76d19ed7a46a3d0b46f932b8bd551b72ed378fb22c8ad2be1a54f3ae089b4e39d13c0a61e239d0f710a98f514aee4b675c0ff8 (encrypted)
Stealth Address
4286df051dcf004f3e940f9fd43ce0f9ae883674ba2c5d9d9eb12848d7181949
Commitment
dca6567a4d8b80e2335ba30cd24e354b9a5a54ef630a287c0c4c10de700e4d6b
Range Proof
672 bytes (Bulletproof)
Memo
c2c39eb5689b1be546b052ff7f6cc35202c4549b33f2315a6d302343d82890e940fd6d6caf2cff16d1e5cd4ecf975a701cd289e9f80b836268f8ee435a5ff15d3e39a8193269faf879ae69a3de65f9d969f66b0079142dc844f81e5074390e43b17907315e84671338a927346f6c64fe8c5f9c318b6556841ad1da5f3af9ed85 (encrypted)
Stealth Address
bcfd324edc1f21f6f22c5f577bff32ad1612045297721f4522119afbf65cfe24
Commitment
3c173099dcd6570ec4825d56a785f1bc0b32a7a582f7e70034441517d5455575
Range Proof
672 bytes (Bulletproof)
Memo
e2ca7f283b66c0d6de189b85ef584efc27d9e8c857a965334cdbdc344030e9696e9cbf52c0f8a29e0b6c34bea864e00afb0ffe829bf7ce2cb313b656f4c5928d6d28a3495de02caf3f136e489ca4d5e54b7b363f4755b8b27ec40ea7a024200323794c4260fb67210b100c0de4010c5412c4cc8fe82405b38b29899deeec4b10 (encrypted)