RPC nodes allow you to obtain information about what is happening on chain, by using HTTP requests. We scan the network and produce a list of nodes that publish their RPC endpoints. These nodes are not controlled by us, and we do not verify the correctness of the data they provide. Although we suggest you to use our managed nodes.

The block heights reported are obtained on a daily schedule. This data is provided as a snapshot of the time when data was collected.

Public RPC endpoints (19)

The last scan happened 2024-05-11 00:01:22 UTC

Endpoint Block Height Tx Index Moniker Validator
192.118.76.194:26657 13,604,200 - 16,252,818 off ???? IsraelStaking.com ????| Powered by NextNet.Works ⚠️ yes
66.172.36.135:16657 13,618,458 - 16,252,819 on node no
95.216.184.172:26657 13,819,974 - 16,252,818 on cyphermines ⚠️ yes
65.109.117.113:27357 14,787,644 - 16,252,822 on CroutonDigital no
107.191.44.212:26657 15,140,501 - 16,252,821 on ValidatorNode Sentry-1 no
43.201.240.156:26657 15,582,187 - 16,252,820 on korbit no
13.124.43.80:26657 15,726,709 - 16,252,819 on korbit no
66.172.36.136:16657 15,884,801 - 16,252,822 on node no
23.150.248.202:26657 16,133,390 - 16,252,820 on mynode-1 no
38.80.157.234:26657 16,133,390 - 16,252,820 on mynode-1 no
5.199.164.132:26657 16,133,390 - 16,252,820 on mynode-1 no
45.82.65.10:26657 16,133,390 - 16,252,820 on mynode-1 no
38.107.226.183:26657 16,133,390 - 16,252,819 on mynode-1 no
167.88.62.50:26657 16,133,390 - 16,252,819 on mynode-1 no
80.79.7.162:26657 16,133,390 - 16,252,818 on mynode-1 no
152.53.34.186:26657 16,133,390 - 16,252,818 on mynode-1 no
185.177.126.104:26657 16,133,390 - 16,252,818 on mynode-1 no
31.210.34.170:26657 16,142,372 - 16,252,820 on mynode-1 no
185.183.33.60:26657 16,171,096 - 16,252,818 on mynode-1 no

raw scan results

⚠️ Validators or public sentries which hold voting power above 0 are marked with warning symbol. Exposed to the public network, endpoints can be used as attack vector to harm the chain. Node operators should be aware of this and have a firewall rules in place to limit the attack surface of their validator infrastructure.