# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
8ccc18a1f444e5bedbb0587f11727c6c318eabebd0cba4035007a310c05d4054
Pseudo Output
966dbc4ea592e1d6a0c50a1fde231b00ba042e6a7829a22c6c0c118641bcdf7e
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2cac7a85f6a099dd2319909eeceee6851b5961cb83bbde26eef3314dd58c8a10
Commitment
faa9047b1d39b79ac44ee5f46ca2d3f8215c07b63df4285ecefc380cd1fae77a
Range Proof
672 bytes (Bulletproof)
Memo
07588ccd49954969b28c2e3694f6bd28d1db07f9b48c1a2b736bb3f5c4a4a665ec5e0f0887ccb748038389bb09f948ef2ac189c23aa71162059e9ce6f31c8dd0cbbf2f3391c6e73f593c9480a91bc4ec8732ff71ef2ce5bb10b2239cf063306f7aebb8d5cf25d9992ad006a690d9cad052447a38c9c4f9829add331c6895524f (encrypted)
Stealth Address
3c6dad3ba288afc087cb695f01da3cb1b2255f34cbae1c738ffa51c9fe3ffd0b
Commitment
eaf9f5a7911b8b9bf1a69ef8e7919ba5d161d7e7f5c0abf101697e46bcd2e516
Range Proof
672 bytes (Bulletproof)
Memo
42666592089660e86b34573d60b6f2dd16700459911f7304e90105873d6f63d9583a2c47e70a888b67134f0e5eec13d3370f6e1daeeaec739b965dab91f7479d9e6236f27f5db423f2562c85ce47841b6c4dc3a49cf649a01cfa40473228049bf9c898f90dafb92c800f8bc1c3f34b006198e19383dd42afcf0ada80c2fb26a3 (encrypted)