# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
36952bb686f58fa4f0fea28b71a77f6e0146f38c81e4c773b10d5ad2aeff7c29
Pseudo Output
3aeb2854469ab85ef5279717315c1af309d006c87249ef624b225a7b203bd044
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
5c3e73839ceba3a98fb9923294f05dcb7d2a6dcef2765702ba13192f8c7cb270
Commitment
061c87d3bfa6a5b50ea9ca6716a5248cf21c037f421657649620561c8f6fca27
Range Proof
672 bytes (Bulletproof)
Memo
befadd2cae0930d3c4150caa51d35b381d502a227d78abf27407d363a5ffcd19991bcf64af1e0161dc34682f4318cfd39cad5becda56456658c99b79e9629dd8816c2cafb08365a4832dd8b3e471c36caa7329fe1f9173ccd04ca588145ba18a6f4b0448e017cde92fe4cd6a5042aa5fbd6604e5d61910759a10334f821532f6 (encrypted)
Stealth Address
ca91cbe4d3256d54a7df0ed6414a43ec1fb3ec0f0208ce76a50aaaa2685c1b72
Commitment
0443fb18f03730ed0ffb92ee7b694b80669a57972e58d333caad09d1209d074c
Range Proof
672 bytes (Bulletproof)
Memo
21a0c121c01bbbcb310f8013be93469e9a2036921c6a40a99b477ef719ae4632b4130754411fb1f9208b34d68019cf5bc947ee657ea744265e3fbc7b9289ecd93f18c2e564378fdccc49d3144fc9f689e69e4f3f1144ba64c54fa76f8589dd8e8ba55bed693ec3001ff3df26dd2ed7f03a949bfbbdb7b037c960c956f956ebca (encrypted)
Stealth Address
bc27780225c8ae6a41ff3e725d5c8a166c623ea2c0cfa983cf71392894eed06a
Commitment
346001581d76346555d593196fe28538f698e3fe4c80b95816d25670d2cba21a
Range Proof
672 bytes (Bulletproof)
Memo
d1d95bac53c0164211d9dd1f44a3f656cc502755bea05fbc0fd51c639d3920cdc4969e5ef34b585be1f0dd8f9384d479a4cd9de972d961372052da4a7e8529dfb4e7cc696fa438f130eec0afe24396753d1386968b71ed31e6392e9165bb7482f3ed97e62539047db6f77653382ba1dbca2cd134902038a34bfd29f7f1486801 (encrypted)