# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
b8a9a3dea45dd99ae37bfa5cf096ae0919fa42a1101f4f6bcea4e9a1f62b0a00
Pseudo Output
7c032cf495a7e90a9d26dd1ce93c4ec75c2bbb29d9a1113563fbcca36402f46c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
2c75936f296f14683271468ceb0d35d88710b68bf5768268c083c0124cad9679
Commitment
08f9d6cb3915613e3cf60cdb024eea4633ce1f1823a30631d8494c12d947bb53
Range Proof
672 bytes (Bulletproof)
Memo
c4e011a8b0a840112112dfefbaecf851191a7294f783a16f2b3222d473bf74a3f29b3715bef33dbc6580a14fb104f13bb07e877f877cd56cc24eabbf079d48890c318f5611a1753f36a0a860037e724bb80e102f587fbaa1bc37ae08925dd69610bb9d59d14bd2fec78e8be267bd5e8a5c154d3edfc69efe5a9c7267e71bf528 (encrypted)
Stealth Address
6c046d92c6b5b3d72d092a357c4063cc1b7c6bfc94f2ad30cf0507c9973c0207
Commitment
ca0f5f9713b4f4e53e4f63d73e885ed9b12e9695b8d6d6a919e2624fd1679442
Range Proof
672 bytes (Bulletproof)
Memo
8de5235341045b11384da8ff5b9f821be1145ed3dfa0c085188550a29bcc2fff0fd125931ccfabf776ed005f99ac582109474d14208ead8667d312489977254c65dcc43c573490b98683a21feb2a3facf48f630df8229602a66380d98bde222c2950a07926ffb87e529b1f7cc757d0e825cfdbfef7bc4baa0977c6acf9984f0e (encrypted)
Stealth Address
32f98dff8b2767d50c34bd5baec5cf78adaa2c4f11ed480f1f4bef1081b45a1e
Commitment
32b9f01dacc4a900d32af66d7a177ede9cab19299bec667c6606c09d6d5c8f26
Range Proof
672 bytes (Bulletproof)
Memo
aa3dd79919f980f24e9a2505905f819f5f40fa6e46bb728d9c5e43dab36f4ed12ef3d29edd0a538917fd0abaad3676ceb0c1fc06200b726efdc9004a2f635b4e4ea02f441e7de7bea0d10173a7e27518d0588f8bbeceb99af301e19757908e8ff99ddf8e611d2b1eee2127090e4040976bab223e6fca28e3d9b22890d5ee2eaa (encrypted)