Block Information
Block | 66e7e2b5660e35315818efe56c36ecb21e1cbf5871d10c6dadc7f684fc8f79a8
-
Block index
833,327
Position of this block in the overall chain of blocks forming the 'blockchain' -
Transactions
2
List of transactions included in this block -
Hash
66e7e2b5660e35315818efe56c36ecb21e1cbf5871d10c6dadc7f684fc8f79a8
Hash of all of the info stored in a block, including, but not limited to, the index, time, merkle root, etc... -
Time
1551520465
Time the block was formed -
Version
0
The current version of the block system used by EagleX -
Merkle root
ee52f7ae95c9b44b0af59a33ce5096e0c0a4f9c9c28be20a670874631233dddc
Each transaction in a block is hashed. all of the individual transaction hashes together are then hashed to form a new hash; this combined hash is known as the merkle root. -
Validator
AQnnbPZqwD1hqKBGdiYj81h9n6sHTPfEv8 Public address of the consensus node that first announced the transaction
-
Size
1,268 bytes
Total size of the block in kilobytes -
Generated BENZ
32
Transactions
Type
Transaction ID
Completed on
All transaction information
Miner
Network fee: 0 BENZ · System Fee: 0 BENZ · Data Size: 10 bytes
Contract
Sent from
99,999.9 EGX
Sent to
99,999.9 EGX
Network fee: 0 BENZ · System Fee: 0 BENZ · Data Size: 202 bytes
Transactions 0 to 2 of 2
-
Bytecode Invocation Script
Hex string of the Elliptic Curve Digital Signature Algorithm signature generated from transaction data and a user's private key. The verification script uses this to check against the public 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
-
Bytecode Verification Script
Hex string for checking the public key against the Elliptic Curve Digital Signature Algorithm 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
-
Opcode Invocation Script
Human readable format of the bytecode invocation scriptPUSHBYTES64: 0x504420127229d9f4958b61ca8b65ec388045d0310b710b0dac0c5533b5416ac93d39943a84bc076120a53bfe198262a0ddb3cc4ae57d44912ec72e423b5f7718 PUSHBYTES64: 0x282f548e605aadcb380538fe3922ddaca9d8d9478f17a418c7b7952e5dbf44bd2135662cda4326ff9afb9c503df41bbc45c367593b2a2b26bec54b88104517b7 PUSHBYTES64: 0x16d2c80a361938fd9c989ef19f629e314e07bdd7773b06e9ca511a56be3d3dd591c1ab4d27736be68cb6b97e5f6f7c2ffa9e4e93e311528c995ddf30a1812176 PUSHBYTES64: 0xbc0ccb376eaa7e01988109857d21edb4b23de71340fdf72fbbfafc398c38dae8b3e2bb2b207d52549a6b26e5bec901ce6e0dd0184512a8143be014de661d9dc8
-
Opcode Verification Script
Human readable format of the bytecode verification scriptPUSH4 PUSHBYTES33: 0x02285583945b2fdbfd6df6fbee08fe3323f7b5c407076dd3d8bca59c3ff3c70d51 PUSHBYTES33: 0x022ce288baa5dbb45f48dcb5faa0d3d76bbaf115797749865d4aa41e247f39dfa9 PUSHBYTES33: 0x024e4d875108a023cd50d697c2e7bd327afd74bf8407714d509b25438bbefdce79 PUSHBYTES33: 0x034fc3f295c03a693914cef8b41c7e9e08423fef22ce24aa00b5ba7c9347b9ac5b PUSHBYTES33: 0x035acd1f77ec4779703509cae0818ba529d14564285d1164c4eb6f8c2696da3b3d PUSHBYTES33: 0x0269678388087d2669ddb95ec197114515e0822e347c5fc206cbfced048d04578b PUSHBYTES33: 0x036f92f463233a803cdac127ff79c8a9e71d99956092044e14e4477262d8597337 PUSHBYTES33: 0x0284c298978232f1a9dbd2d13c94f35d0e35dcf7bb42af6307b2c2e008583c7e5b PUSHBYTES33: 0x0391f35ec54480553c3868a7e4bb2fa475880bc94dffdf2587859b8d51dda98cb9 PUSHBYTES33: 0x03a41cd4b3ce9ce0122dcf6576014656ba9f570eb4acc870b03cdf5c49f5d7cbde PUSHBYTES33: 0x02a6f610342e7d1ad4e31184571741385a5fb83a781ba90d9480cac749e01470ef PUSHBYTES33: 0x03cbe7b7436aada53f344da88a8d36d40f6736e0ab9e3d2eb56880251631eec79e PUSHBYTES33: 0x02d88157849de753bcfbea69d87ec046b65a173cdf2d6a1ab3929afc1db85afa03 PUSHBYTES33: 0x03db00c4f65d867e9458623dd97448d0323159ba8b35ba5cd17177237be9f8d320 PUSHBYTES33: 0x03ec00ef999878200da14d5360e93940006fcb23d36ba82b40bcd08d151d727bce PUSHBYTES33: 0x03ec1e28cfa8b3aa20dcd513af2ac02965924b7d056646c1faa7b392d72fc3cbef PUSHBYTES33: 0x03ef80fcb4be2f9a2350e7ce35e2c9f07a405415642613a2be514ebd5162d73470 PUSHBYTES33: 0x03f7060dd9267d3256136c690bbbf57e7641b01c9be44b26739795f391e1ae3bd5 PUSHBYTES33: 0x02fa030497539275e97bec4dc8fd0544534075713cf7e300008eee673fbdd2786d PUSHBYTES33: 0x03fe9193ea7273f4cd70d92bb57d497af8c1b88e178c0c28eb04803d25b803f18c PUSHBYTES1 PUSHBYTES20: 0xae