# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
22d5580bed053603e0f201b191da7dd4a83a50c1b92777326a15e81313e97249
Pseudo Output
30ddad0a43342dc73ee1c55680c658e8261eafe037c3760824e5f5e977641d5c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
707c337e52f7e477c1e3da23da90bcba5d3db2df29d0d103fe331b3a518cf976
Commitment
06f9d79978ccce62ddeaa06b586484c10c790d85fcbe577fbe89c82b7d747e62
Range Proof
672 bytes (Bulletproof)
Memo
20d8e5a8693f35a419ad435927c60386ea661cf4bd7e1e2e341d32ab53494d352687440b4720ced600ae0c4b200694ad3f8932b86ded22a388f8c5b08ad4fd6590849f33a6005bcd9b765ce4baa2659b0a10dea17198e2c5913285db474e9d7faf5007c35e1de669d3ecc95d4155d624dcab4ba1222bc127bd483653297e22ed (encrypted)
Stealth Address
8cba522d114900a97934d021c263413a556ec2de04171a75fce44b170356fb55
Commitment
5805f5914ce0d3e632505a02e0daddef4292671826ffcbeb3b43379828068764
Range Proof
672 bytes (Bulletproof)
Memo
37a41511c1bd6991cfcae2a8b4d2f6d6f1db1d4f4762ccb3057f48e70ba8c8a20700f39ab2254c49c1e787a49eb38ece905e4bd0e5d53dc75692ab7eb41a5e22049dce41f3f4388ecb622f3c73cb90571adec086786f30c3e7f64aee7b346010a79ffcfc7068f0c2f29c4ea4950b4b76fa9cf0cf665385a10ca97b67d7ec483b (encrypted)
Stealth Address
fa23c6f590fd5d881891078a94a82f23dcff6f5f1dd9288073836a32653c4644
Commitment
6a27042dd26d47b1564de10686b614822e1f7f8084caccf1ac169077cef43554
Range Proof
672 bytes (Bulletproof)
Memo
9561847499c3676fe5945e90f74cab3b66f6d7d54cdeb3294217434b9a5d51a2d212d90981364520b15f1d5c294f6d2bbabdc0574e67543e55b2d0fbf61c9bfb2ab2ddac9e3facedc9f590e27481264351d28000ed9c7726fa807d539c04ea962ff9d66b7f17dacf2e160f3af3933c1380310630f65a6ece6c38d8f2fce9e39b (encrypted)