Block
#1031705
[ This is a Hoodi Testnet block only ]
Status:
Finalized
Timestamp:
148 days ago (Aug-18-2025 01:45:48 PM +UTC)
Proposed On:
Block proposed on slot 1109279, epoch 34664
Transactions:
45 transactions and 1447 contract internal transactions in this block
Withdrawals:
16 withdrawals in this block
Fee Recipient:
0x0000000000675d852C8638Df2f227949052b1208 in 12 secs
Block Reward:
0.020815360244261888 ETH (0 + 0.060863003314438656 - 0.040047643070176768)
Total Difficulty:
0
Size:
26,347 bytes
Gas Used:
40,528,318 (67.61%)
Gas Limit:
59,941,408
Base Fee Per Gas:
0.000000000988139776 ETH (0.988139776 Gwei)
Burnt Fees:
š„ 0.040047643070176768 ETH
Extra Data:
iobuilder (Hex:0x696f6275696c646572)
Hash:
0x37cc48206882ec0a94dafdd5b47e531aed92634c7a0699d9eccc384915182a70
StateRoot:
0xee12db6b71ae809d587dab7a0da47cbfd02cfcae37843a702cfa02cabcf9bde9
WithdrawalsRoot:
0xe04e6d49d9b196c709ab1b7f61bfd6ffd1fac567668241a09fe8eb73abdb9e7b
Nonce:
0x0000000000000000
Slot:
1109279
Epoch:
34664
Proposer Index:
1100635
Slot Root Hash:
0x861dba1114314b1a35846a16b7f3325a71bc34b0f53bd6d785f45c83a55fc7b1
Parent Root Hash:
0x33cde485abb931afb6a0680d7ae2b12e43b6933f1333d8ecf35e51e1cd6f9cc3
Beacon Chain Deposit Count:
37025
Slot Graffiti:
ssv.network NM1c4cTK765e (Hex:0x7373762e6e6574776f726b204e4d31633463544b373635650000000000000000)
Block Randomness:
0x362b885e3147172361211ecf6edc0d240dc79762a3bdc52caccd9755bf54dc2d
Randao Reveal:
0x8f70cac16cd5f37755e7bb9a659a503add92b138fdf73d7104d5a46d0684f260c0314d8c6022df182781ceb77817440e1892ff013ce22e1295c9e7f8d23baca1420b92e3cb0bde5e6126bd6e09b9c60a8c48789f828e4b075064a50a87848431
:
:
:
Blob Tx:
Blob Size:
512 KiB (4 blobs)
Blob Utilisation:
4 Blobs (44.44%)
Blob Gas Price:
1 wei (0.000000001 Gwei)
Blob Gas Used:
524,288 (44.44%)
Blob Gas Limit:
1,179,648
Total Blob Fees:
0.000000000000524288 ETH
Excess Blob Gas:
0 (0 blobs)
Blocks are batches of transactions linked via cryptographic hashes. Any tampering of a block would invalidate all following blocks as all subsequent hashes would change. Learn more about this page in our Knowledge Base.