# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
d025c72cf2ee8a589bba9b00b325432706996773963bc6837c79496dc5438459
Pseudo Output
4089af8469bb54c8f9e1159ca643a7d9fa91638881a0a9a13f085656e33fbe44
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
70700031ff71c791380d03a778eb0932b2f4ec77246aa523d36278a94080605a
Commitment
c653bb6f71a0db3c8cfa04fb551a0c9f9c6f66103f5682d8fa2b783d9fc49723
Range Proof
672 bytes (Bulletproof)
Memo
2be10fe49c4a96939e56b3965164054e0c7ddf65f33035683bb466f8f46478ee1977057ae8aef90e4c33ceb0b0083abce5abb218630103dc4baad786f152a72a2d2dfa60058f6a480aa05225f8b17caebf48f2f97b310a3c4b0cea330e7c614dc8902ac7f0c3386e7fd2272f334b2ad3ebddd48cd07e9c26795b6decf2d48e9a (encrypted)
Stealth Address
a29ac21b91521df2f4a0ff0e34094e250c0324be1558308a36d21fe068a1fe1b
Commitment
207a67fe400578e24f8b504db2a09ccb8aad945819696296df76ce426d56ac66
Range Proof
672 bytes (Bulletproof)
Memo
e0de71c9ad1f4c724ea9a74b4b9b8d9ce7c104469345af9c3890f914ae81a9e8bd0135e30a75f8de22cc70333de5efe262f46c154e09478e67453d54cd5760dc1d682e3fd7ea1b47c97e160117e4a6d26b6dfd7624c1918ba0ec3a2afc7bd069c47469f5ec982b21eaec48b6dd83384f19483de1bbff0b3ca34b81452cb3daf6 (encrypted)
Stealth Address
369733c2127d14dc9905cefbbdddba51329927040fda867d7c0a1bae95789a4a
Commitment
18d1cecf17e695c56e5da2c84ae44bfc4f46aaefa55ea54c044a880674b63343
Range Proof
672 bytes (Bulletproof)
Memo
78b4da7aadf26f4300be6e5b7d3b743c786138b550a11140a09d1934108df2b4af652742db7bf5a5cb8f016e9fe79144ef659e478fd92ebff83f30922d9020714097ffab8b16993a5c4229b8f8e22d99b3c92a39f25fc226de3a5fa3336a2f718dcf3c2de64158ea10b59a27ed5ca5d40fd28863dd0516d9e8a72a956bf218ad (encrypted)