RPC nodes allow you to obtain information about what is happening on chain, by using HTTP requests. We scan the network and produce a list of nodes that publish their RPC endpoints. These nodes are not controlled by us, and we do not verify the correctness of the data they provide. Although we suggest you to use our managed nodes.

The block heights reported are obtained on a daily schedule. This data is provided as a snapshot of the time when data was collected.

Public RPC endpoints (22)

The last scan happened 2025-05-19 00:12:43 UTC

Endpoint Block Height Tx Index Moniker Validator
3.136.209.196:27147 1 - 11,215,541 on local no
138.201.234.229:27147 3,515,679 - 11,215,541 on local ⚠️ yes
138.201.234.226:27147 5,892,276 - 11,215,542 on local ⚠️ yes
138.201.234.225:27147 5,892,276 - 11,215,541 on local ⚠️ yes
138.201.234.227:27147 5,892,276 - 11,215,541 on local ⚠️ yes
64.225.85.151:27147 8,084,716 - 11,215,540 on local ⚠️ yes
139.59.54.6:27147 8,084,716 - 11,215,539 on local ⚠️ yes
146.190.9.99:27147 8,084,716 - 11,215,538 on local ⚠️ yes
139.59.54.247:27147 8,084,716 - 11,215,538 on local ⚠️ yes
174.138.121.14:27147 8,084,716 - 11,215,535 on local ⚠️ yes
94.130.253.248:27147 8,356,733 - 11,215,542 on local ⚠️ yes
94.130.253.252:27147 8,356,733 - 11,215,542 on local ⚠️ yes
94.130.253.250:27147 8,356,733 - 11,215,542 on local ⚠️ yes
157.230.68.141:27147 8,356,733 - 11,215,537 on local ⚠️ yes
209.38.8.164:27147 9,543,939 - 11,215,542 on local ⚠️ yes
159.203.52.74:27147 9,543,939 - 11,215,542 on local ⚠️ yes
209.38.0.14:27147 9,543,939 - 11,215,542 on local ⚠️ yes
174.138.114.28:27147 9,543,939 - 11,215,540 on local ⚠️ yes
158.247.198.210:27147 10,923,142 - 11,215,538 on local ⚠️ yes
139.84.192.232:27147 10,923,142 - 11,215,538 on local ⚠️ yes
64.176.46.74:27147 10,945,651 - 11,215,542 on local no
149.28.180.191:27147 10,945,651 - 11,215,536 on local no

raw scan results

⚠️ Validators or public sentries which hold voting power above 0 are marked with warning symbol. Exposed to the public network, endpoints can be used as attack vector to harm the chain. Node operators should be aware of this and have a firewall rules in place to limit the attack surface of their validator infrastructure.