# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
30c5f174789b7aa038d25d4f3232564c0b02a5fdcd1c2f0d6b269d3f6e98c95e
Pseudo Output
40032d280361edb8a4775dfcf2bd5eb4e5ab114a19003bc55b18f64e5e018469
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e82733a405368ab06570aefd2f9f63cc88a27860ab20abebbb989ff5bca9395f
Commitment
42e7cb16add5ec183ff39f494cfa4d2964445d45146df18edf2d7131a7143350
Range Proof
672 bytes (Bulletproof)
Memo
512e2c6ed04798523730fbe83becf6ae99703675e8b2cdfad2df683a2772bd762bbfed10ea19a7823b4a5e76304ea87766b86b7ad23369dbeb3bc77b5b029bd7f74f9e8f1fdec08f7ad3d1cb7df97605ab80ffb63c4b6b3708eb7fa552a41b3ffdf9e3ab2b3c985b626c3c80f858df2380f69e483fc61d753954a72e3c9cd34c (encrypted)
Stealth Address
6e2da1e8e733764006d845f740733cffeb0ebcd8a607554e1657569a7e8f3365
Commitment
9ee963b09752ff7dae677110dab7f90e7ced019da4142616f215f6f55e0f8465
Range Proof
672 bytes (Bulletproof)
Memo
db981474cc0bab6cc0a4c78629b5be6a5c4c6d0333248b8b7ffe2d46afd4d3f07a17d7615ffd7b22d868f352c9674e1313cc93633aabed656d6110b192b8353d4335b392063820c715ce08122f37151d413b1c0c630b885e8349e0c1653d7e663231d15e260fb496a67aab28e0d7bfddfef7a4b67e1ef00bfe0fd344e7d9d153 (encrypted)
Stealth Address
c69569fc713bc9b41bdab9ddeebd64fbceb6e29d611cb436064da83076fe9675
Commitment
f4274e2c8602d2313a5d3114328d35cd7983b637df7af391a802863d5e643823
Range Proof
672 bytes (Bulletproof)
Memo
c888deed7895e1060f81aa54e666b843ef42b4f7a2f9faa2a6c1f78e6f35622af043659c3bad4885a7c8cd1e53fae1498c8b87cd6f1b3955c09a0e1df18007c7ba39a0a44b11ca4702f6d6f62705be07e1fcd1e897f9757fe67a01b03ad2397cae482a00bda26c53b1e5f8f498c4524839415fdb183ea19ae840d62b0cd25da6 (encrypted)