Block
#24137595
MEV Block
EigenPhi
Status:
Finalized
Timestamp:
45 days ago (Jan-01-2026 05:09:47 AM +UTC)
Transactions:
274 transactions and 161 contract internal transactions in this block
Withdrawals:
16 withdrawals in this block
Fee Recipient:
quasarbuilder in 12 secs
Block Reward:
0.007714853186753566 ETH (0 + 0.008851199531811534 - 0.001136346345057968)
Total Difficulty:
0
Size:
149,352 bytes
Gas Used:
37,356,869 (62.26%)
Gas Limit:
60,000,000
Base Fee Per Gas:
0.000000000030418672 ETH (0.030418672 Gwei)
Burnt Fees:
🔥 0.001136346345057968 ETH
Extra Data:
✨ Quasar (quasar.win) ✨ (Hex:0xe29ca82051756173617220287175617361722e77696e2920e29ca8)
Ether Price:
$3,000.79 / ETH
Hash:
0x7f509c7fe3e5559a5edf6544e7e3962ebfd9caba22cd0d2c276245b2d9d89f8a
StateRoot:
0x2de59f6fac18b4cdeefa32e381ae47db799735682093aea214cca140706e95da
WithdrawalsRoot:
0x8d7c416458627b80750d1ac91489be7fd3864765dfcb43a18c02c1eef15cb256
Nonce:
0x0000000000000000
Slot:
Epoch:
Proposer Index:
Slot Root Hash:
0x63c9569e5a5ea07eba08dff24ec664c957e5f32b4018697ba430e7bc03ab1b4e
Parent Root Hash:
0x34e79e3d44da79cf4ed9ea34ff2930586486228bbb57c5cf257bbbdb119f7e3d
Beacon Chain Deposit Count:
2045305
Slot Graffiti:
RP-XT v1.18.6 NMd9feTK1f73 (Hex:0x52502d58542076312e31382e36204e4d64396665544b31663733000000000000)
Block Randomness:
0x3bfddf33b3bf9a3514fdef8c157979bc74af990fdc3afc3e21d6aa054b0abeae
Randao Reveal:
0x8a23630d527581272d906b6b8532d625056c07ad31fd41307903d06cba533ded57846bfd2017d9ed7c84136462857a5708c7fb9915e45a14b80e6471dc6a65b7edca01da2773f014096a15ce23ab8f9941bd5f4331fabda13dd05ce4d514dad2
Proposer Fee Recipient:
0x56C0507E22F214682a2BEB7E4F959155d802c525 (Fee Recipient: 0x56...525)
MEV Reward:
0.00753240414529341 ETH
MEV Payout Txn Hash:
Blob Tx:
Blob Size:
Blob Utilisation:
Blob Gas Price:
Blob Gas Used:
Blob Gas Limit:
Total Blob Fees:
Excess Blob Gas:
Reserve Blob Base Fee:
Blocks are batches of transactions linked via cryptographic hashes. Any tampering of a block would invalidate all following blocks as all subsequent hashes would change. Learn more about this page in our Knowledge Base.