# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
20e0c7e16820b465a950bb24554b03a43299916ef3b49f23667ea2fa5204a476
Pseudo Output
36377bb7a27a7c8f882f27ed006eff96300e7c54480277951c4d071525aabe1f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
06fdb4030407450bc5e63bc7b082027b6dd16565460b8198d091344989aa035a
Commitment
24e0f60249e16df53f26eafadb8b93cfbe98f0f7d1248d4355de2d5de56e2d2b
Range Proof
672 bytes (Bulletproof)
Memo
2e839a8ac8ed4d9309313903e95e2f775b8575a39e24297c02671b9015984bc3e59777fe5e762e54e0feeb5471facb5e270c4a62788c13cc9150520eb93afa5e0d87097ee6eb534031769650d0dbf9c199d6cbda0fb4349ac6bb773e40db5a3a536384c8b2174d9c4a58e353948442c24cbf857b56b63d7d8c5589b5fd00329a (encrypted)
Stealth Address
f2e121da695cf1f223d9348a3899a33aae21c72d84b2a62fd0c48926ff9ae278
Commitment
26e4c05c6c51662472bfed3a75eb851c210bbf3f9186d1d137f71fa93e37053a
Range Proof
672 bytes (Bulletproof)
Memo
4d839b7cb9d4916c77dff2fa17469f8d2e4a8feeeed033801d27ac649dfe64681af4c42aba43d68db68f4643b348f3a86b726d0e6c7d76b7fc3d03772696c98d037a6638837cc63e15419f599b9e593e54ac9015e384cc5976d2ea6211c2af004e989540b3c7aadb393bcbc3ecebbbc8ac3a66c7e001c3773510cb57643dae4e (encrypted)
Stealth Address
fa27996e07e0b5850aef393efdbe379aa2e430cbaff25ec55857d8ba01d03c41
Commitment
d8698273ed20b0cf314f8fede8095cd375ff6ade9042c1e9795f0307ed73e158
Range Proof
672 bytes (Bulletproof)
Memo
deffc8679a66ed351acae384b41a87763f651b53660ef31af5a2c8283ef282df37fa562be8c34cd3585b2d4635eae0c2579bd39499ef4fc8da178ce7c6fe95163240d72001248f037dfd2169e7c60dd6912fb059dcd98d2895a19d851628e497dab6bac2c6863473af0ca6eb9a3ff36f1fb908b2c224ccc0a896d3ad88188fb6 (encrypted)