# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
60c8f08b7bcf3596bd951cf723b31b815813f958a4cb213ca41c910755c7f803
Pseudo Output
8cab226186a717343edd8ed488a43107d88dd7b90d178ab668efb64a447fe252
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
a2cf05b73fa9511be2f396a9a556d3b0a734f23c682c8b9d8d22e88818eb515e
Commitment
a8871cbda49fa84235c4e943211350074709cba486063bc81d2bd6af0af7e048
Range Proof
672 bytes (Bulletproof)
Memo
f6af2f2434ac292201aec669ec3fa10d684be0e675980ba0f4a990f599772aea3b166799fb631d38e2e93b7e24fbfb34641b0388052fba6380001fbe17cdf195e0d8a6e8ad3613636ca8efee091a8f33f7e1f2e0160f55336d2d7938539a2591ef07222adfea86b1f995b4c0a1929ee0c490b12d8650363ed12e53fd6081d93e (encrypted)
Stealth Address
0e1acae5e8f5c15bb8815f86a8c6ad46f7c15a2fac940ea9cdc4745167501e58
Commitment
0c85760d6c7d3c93b4e44e20baacf34dc5457201a5a599a9969e79581d2aa367
Range Proof
672 bytes (Bulletproof)
Memo
611cbbc236f5510f73806c3736440994f7812606936a1fe3bcbec6c80e9c1d888ab12d6fda307d44c769f2cbf7335a6cd5844c2218a81976530f2d1a35c457af05d8c7bc29ee0009cab4173c15f9c715c3cfaacd7dc15efb4723d64b032a5b7dfb7b85a72fc0cce61533a591265a1e1c17dcc693733d542f4ffaf6141e8f61b8 (encrypted)
Stealth Address
deee3a974163bbf3c98a94d5619d1538bc04238b4593a9167cdfcbfa4b9dde09
Commitment
de81ca6324cb2cd39e67043a78aa7a7142d4b5fe70fa103a4348d52fc65cf033
Range Proof
672 bytes (Bulletproof)
Memo
e587b06c83d3373b384516be4603dfc4e281d71dc5d95f80d6d7822ac7fcc06eee73e2a80fa87d0e0ea610b1e0b121a028f1ebdf2f7ab5074b84212a10e179dcdab5db5b13f52accbbf981fbead5357d9f20d143de61ed5c5cf13eee7cbfff2fc1f0fa3aa526b358b6a0a1f8510914aaaeab1ea3e1691a866bf49b18a0009fbb (encrypted)