RPC nodes allow you to obtain information about what is happening on chain, by using HTTP requests. We scan the network and produce a list of nodes that publish their RPC endpoints. These nodes are not controlled by us, and we do not verify the correctness of the data they provide. Although we suggest you to use our managed nodes.

The block heights reported are obtained on a daily schedule. This data is provided as a snapshot of the time when data was collected.

Public RPC endpoints (20)

The last scan happened 2025-01-18 00:12:13 UTC

Endpoint Block Height Tx Index Moniker Validator
176.9.100.118:26657 13,620,501 - 31,986,214 on full ⚠️ yes
65.21.142.86:26657 28,109,298 - 31,986,214 off full ⚠️ yes
157.245.63.112:26657 28,977,001 - 31,985,523 on CoreumCosmoValidatorRCNy no
128.199.108.230:26657 28,970,501 - 30,479,756 on XCELLERATEWORLDWIDEsKur ⚠️ yes
159.223.182.188:26657 29,867,501 - 31,321,776 on CoreumLabsdyQa ⚠️ yes
167.99.14.128:26657 29,604,001 - 29,855,880 on CoreumLabsWhoL no
148.113.164.128:26657 31,886,193 - 31,986,194 on full ⚠️ yes
147.28.153.4:26657 31,886,214 - 31,986,214 off zeeve_fullnode ⚠️ yes
146.190.78.131:26657 31,886,212 - 31,986,212 off COREMARSHALLSdrhf ⚠️ yes
82.220.91.6:26657 31,886,212 - 31,986,212 on lola ⚠️ yes
82.180.160.87:26657 31,886,211 - 31,986,211 on full ⚠️ yes
147.28.153.17:26657 31,886,201 - 31,986,201 off zeeve_fullnode ⚠️ yes
147.28.153.58:26657 31,886,196 - 31,986,196 off zeeve_fullnode ⚠️ yes
147.28.153.49:26657 31,886,191 - 31,986,191 off zeeve_fullnode ⚠️ yes
147.28.163.28:26657 31,586,840 - 31,686,840 off zeeve_fullnode ⚠️ yes
190.2.149.140:26657 31,293,217 - 31,393,217 off full ⚠️ yes
212.192.49.42:26657 30,958,967 - 31,058,967 on FD_Coreum_Validator no
152.42.203.235:26657 28,847,938 - 28,947,938 on XCELLERATEWORLDWIDES34C no
147.28.153.55:26657 31,947,001 - 31,986,193 off zeeve_fullnode ⚠️ yes
147.28.153.3:26657 31,950,501 - 31,986,212 off zeeve_fullnode no

raw scan results

⚠️ Validators or public sentries which hold voting power above 0 are marked with warning symbol. Exposed to the public network, endpoints can be used as attack vector to harm the chain. Node operators should be aware of this and have a firewall rules in place to limit the attack surface of their validator infrastructure.