Block Information
Block | ed4afa9d5947e7451f9da66efa5ccb7eec11d1a3dd241a8a933f91bb419294c1
-
Block index
1,429,878
Position of this block in the overall chain of blocks forming the 'blockchain' -
Transactions
2
List of transactions included in this block -
Hash
ed4afa9d5947e7451f9da66efa5ccb7eec11d1a3dd241a8a933f91bb419294c1
Hash of all of the info stored in a block, including, but not limited to, the index, time, merkle root, etc... -
Time
1563569360
Time the block was formed -
Version
0
The current version of the block system used by EagleX -
Merkle root
4575c7ac3f96e1ab2b538a7c464cbc23ab43daa421fb3aacbe13758ff2702fde
Each transaction in a block is hashed. all of the individual transaction hashes together are then hashed to form a new hash; this combined hash is known as the merkle root. -
Validator
AQnnbPZqwD1hqKBGdiYj81h9n6sHTPfEv8 Public address of the consensus node that first announced the transaction
-
Size
1,268 bytes
Total size of the block in kilobytes -
Generated BENZ
32
Transactions
Type
Transaction ID
Completed on
All transaction information
Miner
Network fee: 0 BENZ · System Fee: 0 BENZ · Data Size: 10 bytes
Contract
Sent from
4,779 EGX
Sent to
4,779 EGX
Network fee: 0 BENZ · System Fee: 0 BENZ · Data Size: 202 bytes
Transactions 0 to 2 of 2
-
Bytecode Invocation Script
Hex string of the Elliptic Curve Digital Signature Algorithm signature generated from transaction data and a user's private key. The verification script uses this to check against the public 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
-
Bytecode Verification Script
Hex string for checking the public key against the Elliptic Curve Digital Signature Algorithm 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
-
Opcode Invocation Script
Human readable format of the bytecode invocation scriptPUSHBYTES64: 0xc7c3121c64812d8c64bbe8da8e8a19545807b21d93d3afaddeb449a0d28e73182bc2ed5e820c9aae151398dd3b508b6590bf8e68665291dc46fdc27c8ef924b7 PUSHBYTES64: 0x72ff7346ab642868a6e3c7cf977d004430a78599cfe97242c61a9a78b61d57a13bfcc2b14216ba6794386009daaae8c6baa9eb7fe2ef1cc588966b960e402079 PUSHBYTES64: 0x439c87c5a6406b73f376da23968723286e17e44ecde641590787d0b7fa4fcebb2c076ff3ad40607118dad4bc4bab6e7b7332c00f32cb53b93b8b5becda184256 PUSHBYTES64: 0x974a0b457e97d9ec25e58e99a84089b5ac675aa99117522f69da6d921de709cd78506f2caf0a71b96c3b3a51b70387b1bbf7abd3f9fd8117bb8f2264a7e99624
-
Opcode Verification Script
Human readable format of the bytecode verification scriptPUSH4 PUSHBYTES33: 0x02285583945b2fdbfd6df6fbee08fe3323f7b5c407076dd3d8bca59c3ff3c70d51 PUSHBYTES33: 0x022ce288baa5dbb45f48dcb5faa0d3d76bbaf115797749865d4aa41e247f39dfa9 PUSHBYTES33: 0x024e4d875108a023cd50d697c2e7bd327afd74bf8407714d509b25438bbefdce79 PUSHBYTES33: 0x034fc3f295c03a693914cef8b41c7e9e08423fef22ce24aa00b5ba7c9347b9ac5b PUSHBYTES33: 0x035acd1f77ec4779703509cae0818ba529d14564285d1164c4eb6f8c2696da3b3d PUSHBYTES33: 0x0269678388087d2669ddb95ec197114515e0822e347c5fc206cbfced048d04578b PUSHBYTES33: 0x036f92f463233a803cdac127ff79c8a9e71d99956092044e14e4477262d8597337 PUSHBYTES33: 0x0284c298978232f1a9dbd2d13c94f35d0e35dcf7bb42af6307b2c2e008583c7e5b PUSHBYTES33: 0x0391f35ec54480553c3868a7e4bb2fa475880bc94dffdf2587859b8d51dda98cb9 PUSHBYTES33: 0x03a41cd4b3ce9ce0122dcf6576014656ba9f570eb4acc870b03cdf5c49f5d7cbde PUSHBYTES33: 0x02a6f610342e7d1ad4e31184571741385a5fb83a781ba90d9480cac749e01470ef PUSHBYTES33: 0x03cbe7b7436aada53f344da88a8d36d40f6736e0ab9e3d2eb56880251631eec79e PUSHBYTES33: 0x02d88157849de753bcfbea69d87ec046b65a173cdf2d6a1ab3929afc1db85afa03 PUSHBYTES33: 0x03db00c4f65d867e9458623dd97448d0323159ba8b35ba5cd17177237be9f8d320 PUSHBYTES33: 0x03ec00ef999878200da14d5360e93940006fcb23d36ba82b40bcd08d151d727bce PUSHBYTES33: 0x03ec1e28cfa8b3aa20dcd513af2ac02965924b7d056646c1faa7b392d72fc3cbef PUSHBYTES33: 0x03ef80fcb4be2f9a2350e7ce35e2c9f07a405415642613a2be514ebd5162d73470 PUSHBYTES33: 0x03f7060dd9267d3256136c690bbbf57e7641b01c9be44b26739795f391e1ae3bd5 PUSHBYTES33: 0x02fa030497539275e97bec4dc8fd0544534075713cf7e300008eee673fbdd2786d PUSHBYTES33: 0x03fe9193ea7273f4cd70d92bb57d497af8c1b88e178c0c28eb04803d25b803f18c PUSHBYTES1 PUSHBYTES20: 0xae