# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
78d0d94ecce40a641e1cf70100c796f918f1e08dff221ff43aa639255eb2f35c
Pseudo Output
f6f3dd0f65c24bdc1d8ee9ec11cb9cec533cfcdd5f712a4ade73e424f8702d79
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
022700c2777754477e0408435988061420e116903dc509b387f99601a943a316
Commitment
307c2b08e81d5651b7d064f27e78dcad47bda77dd3a7fa30f24b2810cfcac826
Range Proof
672 bytes (Bulletproof)
Memo
5e8e4f7db79027f8a4080b9dcb0d9adcece939bdfe8332eaea97356b72ab893b604e883d411ca945eaf62c92b56dfddc4003d6c5e0aaaf48c32e3e08ab646b87bfa9358e256119508c8c1b2823de2cbcab576ee880befd09aae08ecd53c06f34eb23e17c5f75406efab28145d83e3428233899d6fe33b0cab00117622a5c978a (encrypted)
Stealth Address
149698dc7f724768e4f94046555ec48752eaeeedbb2eefeb10bad5d0587cc112
Commitment
a09b0541b62dea8f46049e3aa874ce2ac77bd5ce14befbae729cdfd2bb386d77
Range Proof
672 bytes (Bulletproof)
Memo
854b7930d9b431856b50d307f17fac2fef45651e464ef95190a9a326a5e51a86badae4917dfd2812c6729e435debc8e293b43d91090937669cb3fccce3d62bbd5a2a022dc28b306192139c99dc0411bfd00b2750a2901bda10d7bcf6da64804ebcb458656fa20b46053f90de50d898b28d739de32be459805dc3c14f15797015 (encrypted)
Stealth Address
b2e0de6adb48752544cebf7c33e4a7e110c8d68c9d9854ba8f72836477cc612f
Commitment
ce6fc6c3564dd29ff268bf63a66c1aa00a95c37fecadb0dab8a30fe0df068b74
Range Proof
672 bytes (Bulletproof)
Memo
2d5ab61fd4d3fb95a9073f9708971a8c3a8b53100c13808119c2e32843c718af9310673663efdf4889df8fad86445dafd989caa1368284c4924e6a906f4617764b1797eac45ef401e8af63c0e25cccc61f700f54a2c8a83dea339feb6a900b020383a56109cb6f14a04edb8a60e2c17a3387eb9faaa3c49377b2e2c0921cd63c (encrypted)