RPC nodes allow you to obtain information about what is happening on chain, by using HTTP requests. We scan the network and produce a list of nodes that publish their RPC endpoints. These nodes are not controlled by us, and we do not verify the correctness of the data they provide. Although we suggest you to use our managed nodes.

The block heights reported are obtained on a daily schedule. This data is provided as a snapshot of the time when data was collected.

Public RPC endpoints (20)

The last scan happened 2025-01-22 00:18:23 UTC

Endpoint Block Height Tx Index Moniker Validator
162.19.222.161:26657 58,701 - 26,398,487 on mainnet-archive no
135.125.160.16:26657 58,701 - 26,398,487 on mainnet-archive no
5.9.78.71:26657 58,701 - 26,375,513 on arceverest1de no
88.198.48.87:26657 58,701 - 26,375,510 on arceverest no
65.109.53.22:32657 20,624,308 - 26,398,486 on rpc-1.evmos.nodes.guru no
103.241.50.31:36657 21,856,599 - 26,398,487 on anvel no
103.241.50.27:36657 21,856,599 - 26,398,487 on default no
49.12.82.124:46657 22,433,640 - 26,383,065 on provider no
65.109.69.90:1001 21,239,404 - 24,537,000 on provider no
51.89.41.21:26657 23,569,667 - 26,398,487 on mainnet-dev no
145.239.3.221:26657 23,569,667 - 26,398,487 on mainnet-dev no
51.195.5.205:26657 23,569,667 - 26,398,487 on mainnet-dev no
65.109.48.230:30003 23,569,667 - 26,398,486 on evmos no
88.198.230.110:27657 23,580,802 - 26,398,487 on hrdcccb no
65.108.141.109:7657 23,625,116 - 26,398,486 on silent no
148.113.163.27:13557 24,004,308 - 26,398,486 on zhamrock no
116.202.84.8:26657 24,451,543 - 26,398,487 on Provalidator ⚠️ yes
65.109.88.254:28657 24,539,445 - 25,255,484 on ksalab no
51.222.40.48:26657 25,732,687 - 26,398,487 on node no
157.90.129.186:16957 24,792,308 - 25,098,921 on gumat no

raw scan results

⚠️ Validators or public sentries which hold voting power above 0 are marked with warning symbol. Exposed to the public network, endpoints can be used as attack vector to harm the chain. Node operators should be aware of this and have a firewall rules in place to limit the attack surface of their validator infrastructure.