# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
f4144ba399ab53323927ed16d3776158fe6b4f413234bb4dba14311e00041962
Pseudo Output
8c3204d1d427bc0bf1431d7134c065dc30a1c813948f16b68634c0a0f3462403
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
30978fbe67af1acfd1713fdb3c47c51d1e903131603e2ae672b605c9574ef97e
Commitment
ec265fbbe8671fa81dc630bcbb9274e6be4ae22e6e35438062c528d52d6e1a63
Range Proof
672 bytes (Bulletproof)
Memo
ef0c51b1f9314f1b75fdf23f5e8d99e57699db6b54125a713db97cc75d64b2bace03dc1e8df012d2381e7ea273868d0aa3ebed815638ad8ffb5d8401fd0833ac55728acce8f3346e69b61da59538afd350c9e029d34172b965334e72188d4e745212ca80e769df67b9b1e0f65e51ae49c86b89c5fee05e520c88b66f6cbb2f8d (encrypted)
Stealth Address
9ed4c3188396361b8a9dec190a9e66dfbb4e95847e72b19428f42776d52ccf46
Commitment
14b197a7736d551465ef4f166792ae616ef99d41072431450ab03a52afbb3238
Range Proof
672 bytes (Bulletproof)
Memo
1a64d8cf950e55601d6eaec5789e866fc33decfea7cb36e455940a9f0d590b964e328189b7ad4d8c0d0f3966a3aa3d8356b5524e543dba3663231c36a67fa105d8d89c7c564b9778e88296b301c260af7f9a75af9b7cb2bdadc2b6c5856e18dec1e988c8784b95a6d0aae7e8ff1f318cec0f8c30f07627e30f22f8c79401d9f5 (encrypted)
Stealth Address
625289c1ea23e0054c36aa5f2c0afa744268166aac313d2d277ff1f8ed510240
Commitment
1e2c21f1bf144565e95cec3b6fe745c428cadb80dc326d895ba74713c59bf037
Range Proof
672 bytes (Bulletproof)
Memo
f17b52a3eee533b0911098cef82b4edbf03120b8fd2685b572a7287415371f3f1bed5cafb4f4cb710af9f13e3c6e6f01bff95ff8e274425ec781030e99a7b0c4ebad67115a6e3b8cb9c015e647355fb444d7f7a767fb1140404bb2b9d7af18dd815efa08290477708883528033c5da6e8c39f42308bf487d28bbc625a204f9e8 (encrypted)