# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
80cae7e4a82400ddb3d3d4330e6ebee5a2d2ccd818ae1b2c4d496e960b98f311
Pseudo Output
ac901a12ef035135ac33a55b1acb679a2c14c538244ac94dc6290c13280f5041
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
26de644aac122b8a989f95e3618fca94e94e7bbb36055fa06c82e9da70e35e1d
Commitment
5080d2c00945be941025989dedc7487080e5f89e0b7ad5264aecc7642a3b797a
Range Proof
672 bytes (Bulletproof)
Memo
c66dd6e3f49275a4c48f643ec7cfed37245f7a111d299afe3d84bbfd6e1a9d9cdbbe0a50f2b15b2c83fab1d409bba4d1db1ac26d0fe27e245d4b62b74665d8daaaa9d6366436e0303679449aa14db160259c055304cdbd2c4ae7ed127224a084c31cb29efcaf9dce7b8c4cb27e7dd76e969dae9861a32079c984a7cad11e7b92 (encrypted)
Stealth Address
681fa806505cfec89c0c72d404d6b9214a165064bc22c3bd2b42b47d8786ac72
Commitment
b0ced888191553d25a7a57a128b89ff4219ab5120c6e6d2fd4dcfcbdbbf22b7b
Range Proof
672 bytes (Bulletproof)
Memo
bdf2b98921905781b1b05933d1652dbdc84b50e5653b4cbe3f859ad71fb3f861eca08d92e46f9c1bdf07dcc42e3f58031bfa06af0d26d3f8f3724b74031a5026cebdb3bb21fa10777b40262605e0e7b52071361801fb1c9270025ab6821abeff275c9dc483b37cecc8d56563888839c92ed9505f2df9258e32c0cc74b309a498 (encrypted)
Stealth Address
5a9f3dfa64f5cf4d7a8256ab82b5a04c768f0409aa369703e06011f8ab51b563
Commitment
e8ab66855d036c07e0d93fd163555340ddc3ca31cbe7f5f598057802b8c25029
Range Proof
672 bytes (Bulletproof)
Memo
677e55815f161cb11775244c2d4edb3273fff8c237685ce74ae6c93082bc8fc37dd9dce8e1bb5e60445272c1c877c60efc5c9f415cce8f7d19d9da9dd62dd7f0b213ce5f24d53fbed8c14482a8e16d401711af1503b0caf9ea2e2327ca78b149a8971c6508b62fb76066e759c503f5a7616131cace79d9a08f021aad60722fc2 (encrypted)