# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
ec1f6ccdffdfbfeffff976e2baf7086db9631fef8e91e5969025b3eb524db05c
Pseudo Output
10505258f6dbdf56388902b5ed2a1df29fd343886fe8995cfd2ee8d9b0c5b835
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
80a7b15645a3853958f8aeca883b98bbac3a67148051f9b6ad0dc6ea6df17e09
Commitment
1052da3d4e17ceac75ead1e1d68a2ae4c4b121dfbb0223c87d20de1257111b79
Range Proof
672 bytes (Bulletproof)
Memo
fb865ad927623a41be3df167550dccde2fd16614318b382b2a26cfbb39490a5597ab467322343d1b3a2a7f04c369d07c002f30b1195aa36591feaf3cdaa9f16607eb065d6da827415ca12775f0400d4f1377ffffee8afa7644defc5de9689cbf5144aaaa1ef2ab0744898328de4662f66af87c439b79769d4291872c6882287c (encrypted)
Stealth Address
02eeb65116b91c22e8f7265f5ffa82864de8e4f3c406af650f74243fb16e730f
Commitment
0e938af4090a4799a06d75ce5b8767e127c11c21644e4d5322b1ec5d5d044574
Range Proof
672 bytes (Bulletproof)
Memo
5626de179dd54de04692e65fbdd9b50fe075c80ff2a694fce45ee34d9934c8335b73ba148525e5ec4d36ce49ed96ea45954d35f56a4a08979211b48a85d7ae870db4273433b85cc1d8a2328dbf2290f964017db2ac424084e02704a3391e8a034f125bf04dbdb5fb981aeb5d2264fcb95ac38485f41afeddeed522042535c7fc (encrypted)
Stealth Address
881ca4dc4d777d379ae7ee4f04505e034fcb353861179e06047ed7354783a463
Commitment
6e4f5fd63b1bb599ca8364af8199ce114be4de47003df19fbb8007b94c10fe6b
Range Proof
672 bytes (Bulletproof)
Memo
4e7f03f9eac58320d8d7a42d1ce44aeb838b225cb5b4c6633ee436cc364417306dd6022ed29604c5b80a99d0c00795fd252bb880d0875531db6ea1f6c5adf161d8529b9fd1e68f48bf0038e36b31f85e1b653eb461e2f86fef234ac240effea42b26161ba9b483baf6d1923d68df4cce20460bafd5c1475c626230e61d2e34cf (encrypted)