RPC nodes allow you to obtain information about what is happening on chain, by using HTTP requests. We scan the network and produce a list of nodes that publish their RPC endpoints. These nodes are not controlled by us, and we do not verify the correctness of the data they provide. Although we suggest you to use our managed nodes.

The block heights reported are obtained on a daily schedule. This data is provided as a snapshot of the time when data was collected.

Public RPC endpoints (20)

The last scan happened 2025-01-22 00:01:05 UTC

Endpoint Block Height Tx Index Moniker Validator
135.181.1.67:26657 1 - 19,896,393 on Arcturian Tech (archive node) no
43.201.240.156:26657 15,582,187 - 19,898,388 on korbit no
13.124.43.80:26657 15,726,709 - 19,898,387 on korbit no
159.223.201.93:16657 17,965,485 - 19,898,392 on new no
66.172.36.135:16657 18,023,048 - 19,898,391 on node no
66.172.36.134:16657 19,022,182 - 19,898,392 on node no
192.200.96.42:26657 18,294,054 - 19,088,470 on mynode-1 no
31.210.34.170:26657 19,121,987 - 19,898,388 on mynode-1 no
104.250.149.50:26657 18,194,627 - 18,923,874 on mynode-1 no
103.106.58.41:26657 19,444,193 - 19,898,388 on akash-rpc no
95.214.55.190:26657 19,533,679 - 19,869,991 on DECAI no
104.250.132.26:26657 19,619,206 - 19,890,568 on mynode-1 no
104.250.134.194:26657 19,576,501 - 19,823,878 on mynode-1 no
145.223.126.118:26657 19,654,052 - 19,898,391 on BozolinuxAkash no
67.220.71.48:13557 19,690,328 - 19,898,386 on arc10-akash-node no
99.79.41.91:26657 19,533,679 - 19,685,289 on akash-node-praetor no
35.240.135.61:26657 19,406,560 - 19,528,626 on mynode-1 no
66.172.36.136:16657 19,846,621 - 19,898,391 on node no
68.96.211.19:26657 19,872,543 - 19,898,386 on Bozolinux_node no
142.171.116.87:26657 19,235,695 - 19,244,881 on mynode-1 no

raw scan results

⚠️ Validators or public sentries which hold voting power above 0 are marked with warning symbol. Exposed to the public network, endpoints can be used as attack vector to harm the chain. Node operators should be aware of this and have a firewall rules in place to limit the attack surface of their validator infrastructure.