# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
00cca5e7c3890fd9e1771c2bcdcc469c6841d94f64365387dd48b71be696d205
Pseudo Output
8ee89065e50c3753a0319c61506bd385a072e2eeaff5d1d3df69a6d95e29202c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
cc7a2104777a56b4aaf7cdeb11058577657bdafb4a5a4853663feaf73d125569
Commitment
4c69b6bc1260c694da53bb00c0311a1c1fcb2cb44114af51b5539aa23a615f2d
Range Proof
672 bytes (Bulletproof)
Memo
0d218f307271d897efb082b8a42de2a003cca0d5b8bd083b36c46368f183a45009aff55c7f045466add0795a0441004c2ce3c46422acff34cef675932ec91fbdd55dd1b9c91df232556ed86077ae0ef3d81045d17bdb7245998592dd52a197201e61fa4cef38e57d2162fb45c7a8c1cfd43a304898fc0e0fd61155d081f0db11 (encrypted)
Stealth Address
ba5ca9e5e68ea59b0bfa964e0d71f96a1276f75b5ad086fbb5868051d9721037
Commitment
806c7282fcc7364d88485dbe5f44a7f209ac640658103076baaf508fa3b1d205
Range Proof
672 bytes (Bulletproof)
Memo
154bd9cea81267166bf7c08ff0a10fa1eef0c781323b8a5ae628790145949b6d8388b9379ceaefffef75b71ce68adb2f4edfa79c76ce6eb3ab45e10e4441465a117fe0280d43f7dbff7011260157d5efe57d6eae6c5119a6672dc8a4427a51d805f0a790e01b92ba39fa19f285c1e9748667c0110db0d3fa8319616937b9acfc (encrypted)
Stealth Address
90ee531c3cf7e43fe0f38be1bb2f5a4ba634e2afb264dfb7e4f681d0f850547c
Commitment
ce1f55d9651e9041902681926376ddf57da3a84ef08a9584b3c1800c43e9d021
Range Proof
672 bytes (Bulletproof)
Memo
45bfb5c3f1826933611a28b3ea1429e4ff3158f3a24cdb2efbb38713928ab728c38ebc3cd96720dcb8b5010f9a7978041afb4829661047ca0abdc44197a6f36a909860533851ce0a6f6d9b5f4d2f8fd96809300329801bf076efc5ba970c72f26922965ecc9a50bf0ff2a15dfa17ebf085b7850b0c0ebed7fda8cbe91f90f333 (encrypted)