# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
940d5c8112e75317a05f811745b752cafb4cdb50df72a2fcf48ae5ba8ca1ed7a
Pseudo Output
3a7e406529a0166136b9e449414d93118a2efbc0cb93900ba323541dc09f7775
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
80a372510518e8f33ad42970dd4a538fd2b19d0cff710d5011d8a7bd07befa74
Commitment
bc27ef9ed318b753ba6f1126cbad59b013acbb50e3bec66fdf1f87e8e2b62705
Range Proof
672 bytes (Bulletproof)
Memo
8283e3ec095469dd770ec9aced0456bdd0d656dfc26ac15d1c7caedad8a72a11443a3e42c64a4f61c156a6e06d839a7ad569babfa1ce487ee6b3675852791915877b93bacc92019b8747d7e1f798727099f5f94f8d52dab01cdd7fde4638593162398ccfac5b37e6126a800aee764981a4b1b601e85173564553de46c647838c (encrypted)
Stealth Address
a065a954da70d0d8afbf5b6973d6a3c5fb787a38698e100b0c7ca3e77543e11f
Commitment
5c5544e7f15e69b21318af83d6d32cc4301754d0d66321fb8d53d4940e202213
Range Proof
672 bytes (Bulletproof)
Memo
f6fee42dca2d4ff3e21dbd9de583db4eebf2dcbaf04f5fccc913e54ce3e54371763825d40200c486c06454d20d3631be9415a92cc6157f349f4148207e0a9e027f537896be35eaceaab46c4a3e36266a4f98f752ad4c7fd91169607bcbb39b4db2e0bbde98f982af5f8ce2530a368fa757b642a48b673e0f0daf27cb8eb0cb89 (encrypted)
Stealth Address
a07aacbf189a0a21568f324b4a03b20593d02e6b15521ae7e709d9a4ad65e363
Commitment
e839e0ee0a101a10e0176c981cd5360c848080c2f302b71c8f06bff6d6629a38
Range Proof
672 bytes (Bulletproof)
Memo
1dd0905d48aeff6d97978f18cfe0afa9865b38fefd8850c329ee6de76658784b46cac8a64dfba2c414b5710497bae88575dba6c30879a99cd368fd532abadf977ae4c57d92c6ee525df8f2300f5dd839c87ea37b075538c0fcad2876644839ebde693b034a274ed6b4d9df00eabf88a7eddcc915888a002923e0336cf65b88af (encrypted)