Transfers view
UTXO view
Obyte.org
Unit Legend
- not on main chain, not stable
- main chain, not stable
- bad unit
- not on main chain, stable/confirmed/final
- main chain, stable/confirmed/final
- not on main chain, selected
- main chain, selected
Close
Close
Unit ID
u1nF6tF2A+wEi6hllI4jZEwdXVNOxwga2VnnrtM1nt0=
Received
05.06.2025 20:23:58
Confirmation delay (full node)
11 minutes 29 seconds
Confirmation delay (light node)
12 minutes 35 seconds
Authors
77KVAKDFPXF3G4KK5WC5FWP36YN2F6SM
Children
JQj6k8TYZp3/losf/26gyZ1VgRY9ScIcxjb7sWyzQHo=
Parents
+MvJQGiP4fmDEvL4NZ6fYVLfpEtC/WUJMBKFWC92fTg=
lpKkqYQBsS6QUGi/i+wssclzbE8MZz0q3NmDj2JpvNE=
Messages
Payments
R2OVZFLVPBY65CNRL4W6GKK34XGOOQJS
0.00001
GBYTE
Data
consumer_aa:
CITYC3WWO5DD2UM6HQR3H333RRTD253Q
req_id:
224
proof:
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
AA responses
From R2OVZFLVPBY65CNRL4W6GKK34XGOOQJS
AA address:
R2OVZFLVPBY65CNRL4W6GKK34XGOOQJS
Bounced
Response:
{ "error": "formula $req_id = trigger.data.req_id; $consumer_aa = trigger.data.consumer_aa; $seed = $consumer_aa || '-' || $req_id; $proof = trigger.data.proof; // the proof is actually a RSA signature $pub_key = params.vrf_providers[trigger.address]; require($pub_key, "you are not a VRF provider"); $req = $consumer_aa#2.$get_randomness_request($req_id); require(vrf_verify($seed, $proof, $pub_key), "bad proof"); $proof_key = 'proof_hashes_'||$seed||'_'||trigger.address; require(!var[$proof_key], "already submitted"); require(!var['finished_'||$seed], "already finished"); $proof_hash = sha256($proof); if (trigger.address == params.finishing_provider){ $acc = {count_missing: 0, proofs: ''}; foreach(params.vrf_providers, 10, ($address, $pk) => { if ($address == trigger.address) $acc.proofs = $acc.proofs || $proof_hash; else{ $ph = var['proof_hashes_'||$seed||'_'||$address]; if ($ph) $acc.proofs = $acc.proofs || $ph; else $acc.count_missing = $acc.count_missing + 1; } }); $bFinished = $acc.count_missing == 0 OR !$req.want_max_security; if ($bFinished) $rand = sha256($acc.proofs); else bounce("too early"); } failed: plot already allocated" }
Technical information
Fees:
1,382
bytes
(405 headers, 977 payload)
TPS fee:
0
bytes
Actual TPS fee:
4
bytes
Level:
11764913
Witnessed level:
11764900
Last ball unit:
YWgX3uHxiFy+//4k278PDVlLBmER8o1lvB6CJ+TnTNw=
Main chain index:
11372119
Latest included mc index:
11372118
Status:
stable/confirmed/final