Block
#23435519
MEV Block
EigenPhi
Status:
Finalized
Timestamp:
163 days ago (Sep-24-2025 09:15:59 PM +UTC)
Transactions:
196 transactions and 103 contract internal transactions in this block
Withdrawals:
16 withdrawals in this block
Fee Recipient:
quasarbuilder in 12 secs
Block Reward:
0.0102817575122101 ETH (0 + 0.013503810105792754 - 0.003222052593582654)
Total Difficulty:
0
Size:
125,387 bytes
Gas Used:
18,843,786 (41.88%)
Gas Limit:
45,000,000
Base Fee Per Gas:
0.000000000170987539 ETH (0.170987539 Gwei)
Burnt Fees:
🔥 0.003222052593582654 ETH
Extra Data:
✨ Quasar (quasar.win) ✨ (Hex:0xe29ca82051756173617220287175617361722e77696e2920e29ca8)
Ether Price:
$4,154.60 / ETH
Hash:
0xc30fcb333acb274a0357fd0343044223cb007fe94d7cf9f31bafa18ad4a756d2
StateRoot:
0xc99345fb3cf0dc21411dbd64bc7572bb41ce878501ea7d545036f583a6506999
WithdrawalsRoot:
0xa10e753b07a92eabdd5427f8fabd7cfd6fe203b2a4a57b52843823a7e546913e
Nonce:
0x0000000000000000
Slot:
Epoch:
Proposer Index:
Slot Root Hash:
0xf816f9bab8ba5e22f098ee92ece6eea28c2486ce4defc87eaa304516bebce140
Parent Root Hash:
0xbd36e2ea6cd8df36ccdd8124dca40acbd38cc591bb3039f5f5234be184f7b88f
Beacon Chain Deposit Count:
2045305
Slot Graffiti:
ssv.network NMcda5TK7569 (Hex:0x7373762e6e6574776f726b204e4d63646135544b373536390000000000000000)
Block Randomness:
0x93b87c7ef7bf1b254f5a7682f1c708df6266291367ea41c85e4c6114fa72bb30
Randao Reveal:
0xb72a51641630012bc8dddbee2e7ceebb3497922fedd4c5ac55a412e3f4fce25549218e7aa3d5adace120cf08614d8fa50e705804398fc8d5503152b0f4f18c77d0812ca4673419950ca111ed8b97db7b543421ba0b765755ffefc69265ed626b
Proposer Fee Recipient:
0xb2F801913949c3eecDfc814CCc743618efF1f8c8 (Fee Recipient: 0xb2f8...8c8)
MEV Reward:
0.008107037037037037 ETH
MEV Payout Txn Hash:
Blob Tx:
Blob Size:
Blob Utilisation:
Blob Gas Price:
Blob Gas Used:
Blob Gas Limit:
Total Blob Fees:
Excess Blob Gas:
Reserve Blob Base Fee:
Blocks are batches of transactions linked via cryptographic hashes. Any tampering of a block would invalidate all following blocks as all subsequent hashes would change. Learn more about this page in our Knowledge Base.