# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f8f6655f58318f1e32647019b737d991acc35c1881507f7580585dbb66b21d60
Pseudo Output
ea446133f695a38d889c2e52841fb164a5e5bff34a08554298bce4586db6c87a
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
b28bc1432be9267b44d5a267c3fbf47e2be8f658d211b5ff020264931f54a241
Commitment
8c316dc222d342d920d5a49c0a0d0b7b5fde5291c95fec8bd0077f618228be0c
Range Proof
672 bytes (Bulletproof)
Memo
cd1928294c08e2476e23afea22ac5fa2977b57efea4baf1c414db661350c0b217e5ee4131f2621b4f8c9127d84e7358ff864dff464215f27ab0db8ed7dbb5c018311043ebf3309c49a4e9e4724f6eaea9180018e06b621cb33e071adcd4e3d97392066522a0f975de7582f776016af163e612d216b851ab14a74c07cf590b1bd (encrypted)
Stealth Address
48d442b2c616fc77d62b1c00b2fcaac5d1ef8e0abdd6e7ed19655a4179d8db5f
Commitment
e6e7b4d5c6c91a46428f27c94cf6f190b81d78fb7e0fa0c61021ab0f3c5a9917
Range Proof
672 bytes (Bulletproof)
Memo
28a5a6c8b1cc19f19027db6ede0f7e790ff5a8597fa6b9d2f138235736d78830d929e5247f138f7b25c784d4eef40d8062556971f16b705cad28da75aec7a1921525826c5d5aae200f29b6193b318cb802f1e59e75dccf33cc26f2fcadec1a820a2af95ad62f94635489eede5eb96d0ddc87175bd5587cbf84f25d1e2496ed82 (encrypted)
Stealth Address
3cd417c211034d013f464b14a806f6ca360322a30a57897da2da93512b979674
Commitment
18340e6bd1b0440dd2cd1c4cb231ac9e4a3f9295af7bc1e8564fa7cdfe13b553
Range Proof
672 bytes (Bulletproof)
Memo
5225549815a62713f339d085bcdfb5c8fdbbbeb91648f5fd531c0861650a4d24b138f0c94e74d3e73c3bb3c77a07853ae8595ec1e1b36d7eeb093ba8099153926a939e7de844792013ee413145c7c24944fd6637829f8b8161e7e21b524ae6fb389c131909e69a1c4319bf80a9e304db71ee1e9fcf646170711fb05fa45f4e60 (encrypted)