# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
30ffd9a12c76989ccb94759fb3ca417edf4a1bf2859a202cc0c6f9d66e99e269
Pseudo Output
22d8544d055d5df6675223f6e01adaa25a70ed91899684dbbb9b7f39152c531a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e898198f730bb83248f0efacc59823caa185070ba3af636e82c2effbb9c8c85b
Commitment
c2cb3ffcce25e3930355ce74ff00284363e0456dce24ce380a0a63ac6c1a9a16
Range Proof
672 bytes (Bulletproof)
Memo
8c709d921fa6637377b3bc2134c568f62317adcc5e0930b73669f27634ceff84fc950ec2ea4737cf4fd6ff3791663b6efd5915501811d32f12ad3ef094ba95b83c9b25f8b85c794ac16cfb66bceb3336831ff73fa4f50a1c6e185d2e9b2ffd382c176d817b4e0dec7393764a879e480d6b3e4cc276bf2f073ca8b3ebacd8fa20 (encrypted)
Stealth Address
eabdf44567cb429ad68b8498e8ddd46a26dc3458eab8ef2ff6f7fcc50823531b
Commitment
d426e5f6af0a4e87ad9cf530480f76fe631201a10be4134590e021a1bdbf550c
Range Proof
672 bytes (Bulletproof)
Memo
3e3b5334538e1ba07c7d984c119122273445e8491433bd72e2bdd3eae5d21200734cef3891dfc8b58c4c78dea6358f3c0a078bc8e7a71141b77b63fdd443ad0279a76e2ae1fbb371aa4a0f24d6871b8468502f494330f3b8fe92db8538c9fe6d0b9bd18227f41bd4f61c04571382b3a77f1b4fc3d2e2f61b696cfc49a327e81b (encrypted)
Stealth Address
dc2b75b28152b2639588ac611b052600b1e73e1fc6caf92dfa3937d98767c06a
Commitment
585246e8fbac31f34fdf0f706e4dbb4f55e877fe6e9e1d5562e8059879302d30
Range Proof
672 bytes (Bulletproof)
Memo
0a7e90c7eb6d7c6f304eb490de912fe6825c24a3907d096256ed47e48f2bb375a2e18cf562f43f3048eb646313234cfdf6bf631f3d15adee5993a923dc84ec1eb4abdb533e533757b518d7ec729b7fa9a4112b28715e8bc5cc8daeed62fcf3739ad54d40d4583795494a41c304c82e0f2ad90f3f66cab6f7990f3c2276a83ea0 (encrypted)