RPC nodes allow you to obtain information about what is happening on chain, by using HTTP requests. We scan the network and produce a list of nodes that publish their RPC endpoints. These nodes are not controlled by us, and we do not verify the correctness of the data they provide. Although we suggest you to use our managed nodes.

The block heights reported are obtained on a daily schedule. This data is provided as a snapshot of the time when data was collected.

Public RPC endpoints (21)

The last scan happened 2024-12-21 00:06:28 UTC

Endpoint Block Height Tx Index Moniker Validator
35.237.31.230:26657 1 - 12,817,250 on moniker no
121.134.31.130:26657 1 - 12,817,248 on bh-canto-archve no
34.162.235.213:26657 1 - 12,817,248 on moniker no
34.162.72.230:26657 1 - 12,817,248 on moniker no
186.233.186.160:26657 1 - 12,355,585 on graph-rpc no
93.115.25.178:7001 5,312,983 - 12,817,250 on Zenscape no
66.172.36.134:51657 10,824,033 - 12,817,250 on node no
66.172.36.136:51657 10,824,033 - 12,817,250 on node no
66.172.36.135:51657 10,824,033 - 12,817,250 on node no
138.201.85.176:26677 10,824,033 - 12,817,250 on canto ⚠️ yes
66.172.36.137:51657 10,824,033 - 12,817,250 on node ⚠️ yes
15.235.50.69:13757 10,824,033 - 12,817,249 on bh-canto-r1 no
65.109.48.230:30203 10,847,507 - 12,817,250 on canto no
157.90.0.102:26657 10,847,507 - 12,817,250 on DTEAM_GUIDE no
65.108.75.107:16657 10,847,507 - 12,817,250 on node no
34.148.145.195:26657 12,211,501 - 12,817,250 on moniker no
34.74.163.37:26657 12,212,001 - 12,817,249 on moniker no
34.162.108.223:26657 12,241,501 - 12,817,248 on moniker no
34.162.195.180:26657 12,420,001 - 12,817,248 on moniker no
34.162.118.102:26657 12,399,001 - 12,524,778 on moniker no
65.109.65.210:29657 12,717,250 - 12,817,250 off moodman ⚠️ yes

raw scan results

⚠️ Validators or public sentries which hold voting power above 0 are marked with warning symbol. Exposed to the public network, endpoints can be used as attack vector to harm the chain. Node operators should be aware of this and have a firewall rules in place to limit the attack surface of their validator infrastructure.