# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
c606404da8051ee91d06bb68f4474d7e14a4063c2ca7ebcd22162e08b6ad5c38
Pseudo Output
54693ec04445134e12976c34c2540492e9abb881b9279878ede5d5851a72d022
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
bc17969391f299bea99e439816fc2cb5a2d3a91381554b0312ce90f884a9ae02
Commitment
828b55f63bd2c9e06b087e4830b926cd34dceca0e239da3284b5902949e52646
Range Proof
672 bytes (Bulletproof)
Memo
578c801cc4a8087b0cc1d699f765e42531dfeeefaf2aa5dd88f25cc7b5486854ccc1131e7d4dad16baaa9c037d7a8ac54a065ef4766a6772087737bcff4f1761c701089ee10ce6371600f61d78058d0b47ffa74ad2290394c6933c46fc12387bdc246dec74b500f6733031c55e81eb935e6f6f04641ebe764a700fce11916a14 (encrypted)
Stealth Address
1ef37cca4efa1c80f1a8c12d82f8608787d3387a48519bf1934675ca5af0017a
Commitment
e6bba13ec5824ef52a11f5a310abfa90ddcacfecec49645e779df2880fb25373
Range Proof
672 bytes (Bulletproof)
Memo
45c6c8cd4c2d96a9fb1f07cfb3b131b463f6a52dc9c88d0454efc35804dfe7534d76e188cc33e74dc4ba3d9f7a081444bc2dfc6f070e79f4e5be9fcc0bef9373ee6ebcb806f010b34bbd3d6375d1c52369494fda862a8603a7e9e5a7113b91433d6e4d9f9d1af1cfd23a53c04145f35d8042449e9566c14e34e22e2c4b821d5a (encrypted)
Stealth Address
c6a93b1c27f972e0ed2b0e11c4cad9083ed3467a02853628a6a42eb38d9cac4c
Commitment
506925831ea18ecf85aa427f81de0241247299ed40566292134f47770866356a
Range Proof
672 bytes (Bulletproof)
Memo
5620ed805d09fa640ae966af486bdeb1372783bc58d5df7b454c87323dae2508364be05c1b38df552d564a1db21acbf91a85ae40a765954805579566f1df2a1ddb146483d9d75904208620218258061aa2672cc0aab2bf73adf6dc231482ceae05eaf3f65047199030971807306f56781b51c4f203d6e69aea7ddc0524eb6472 (encrypted)