This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"coinbase":"FA3rms2iUn7acEZ6rxNRvqZ6jg9KCWfoVUcAjyknUWj1PPtKx9kr", | |
"dbht":219428, | |
"winners":[ | |
"22b8361b8970e2d0", | |
"08df86c5b80b1b08", | |
"9646f7b62a7d5e90", | |
"b957591e7303d284", | |
"6b2e967dedb10604", |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Top 100 PEG Rich List | |
Pos Address PEG pUSD | |
--- ------- --- ---- | |
1 FA2aQnwN6p6RgaLBJYC5FvgMwEg1bMXXgVdUv81SWxE87dqz64A4 28245072.15670091 117623.21358792 | |
2 FA32b7G2iEv5xHqB49prDQ4UzRNk1tat5KLKVPgjACeRv1PyTFsu 23803873.75894287 99128.37580426 | |
3 FA2Tav4pLACg8JWMWa2VFKo6rV5R3DCDrhtkxxxfLTwPWx9k4E7Q 10350000 43101.333 | |
4 FA3KJ7Av4td7F6B2BtUUkmdgrfZLoubrX53SnC1DZNNrzSF9fYsD 9800000 40810.924 | |
5 FA3SjiVbV4JxGSTMX4SnF2fJoAC82kTHVzdCBgEUMeSDFKoVC5Qa 7636480.29011989 31801.20579056 | |
6 FA3Zcpiv9LmagPPaR672WveUQ1RTK7Mq4P65QEhs6HYZJaEhg9hx 7000000 29150.66 | |
7 FA3LDEA5fcskV6ZoFpKE84qPcjd7GYjEnswGHMZXL1V9d14wmgh3 6718461.42973908 27978.22640877 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
INFO[0004] Starting sync job of 1017 blocks height=221240 syncing-to=222257 | |
Query took: 866.098638ms | |
Query took: 819.950483ms | |
Query took: 857.136982ms | |
Query took: 934.746321ms | |
Query took: 831.586155ms | |
Query took: 993.641821ms | |
Query took: 841.34005ms | |
Query took: 856.918348ms | |
Query took: 1.0526962s |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Time,PNMC,Factoshi | |
2019-12-10 13:34:41 +0000 UTC,0.00245624,0.00249919 | |
2019-12-10 14:17:22 +0000 UTC,0.00241099,0.00240943 | |
2019-12-10 14:18:23 +0000 UTC,0.00236338,0.00240943 | |
2019-12-10 14:19:23 +0000 UTC,0.00236616,0.00236625 | |
2019-12-10 14:20:23 +0000 UTC,0.00231900,0.00236558 | |
2019-12-10 14:21:23 +0000 UTC,0.00227060,0.00231967 | |
2019-12-10 14:22:23 +0000 UTC,0.00227241,0.00227178 | |
2019-12-10 14:23:23 +0000 UTC,0.00232029,0.00231925 | |
2019-12-10 14:24:23 +0000 UTC,0.00232017,0.00231888 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2019/12/20 18:16:44 http: panic serving xxx.xxx.xxx.xxx:35178: runtime error: index out of range | |
goroutine 189374 [running]: | |
net/http.(*conn).serve.func1(0xc02648dd60) | |
/usr/local/go/src/net/http/server.go:1769 +0x139 | |
panic(0xce4400, 0x171a440) | |
/usr/local/go/src/runtime/panic.go:522 +0x1b5 | |
github.com/FactomProject/factomd/wsapi.HandleV2Diagnostics(0x108af60, 0xc0000c8000, 0x0, 0x0, 0x1, 0x1, 0x2f) | |
/go/src/github.com/FactomProject/factomd/wsapi/wsapiV2.go:1588 +0x1143 | |
github.com/FactomProject/factomd/wsapi.HandleV2JSONRequest(0x108af60, 0xc0000c8000, 0xc031fb3740, 0x0, 0x0) | |
/go/src/github.com/FactomProject/factomd/wsapi/wsapiV2.go:169 +0xb03 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
=================================== | |
EBlock 241472 b30cffb2303b6cb98ca0750625993a8041d999e9cd47a024612eb7f52021d5fe | |
=================================== | |
ID Miner ID Entry Hash JPY | |
1. Schr0dinger bd9b216252f3f65e0289bc793604464e887d97fc7a79ea09f6918d79b54c0f9f 0.009308 | |
2. FlyingDutchman 56e848632e83539e4b56dccf94e32eb9a19c93c1778dadc9bb4788124b2fc5c7 0.009308 | |
3. HedgehogsUnited a820b9ac0053f174bc38fcfe62512fb264c2b08fbafe30de510fa3efb6b11cae 0.009308 | |
4. FlyingDutchman 9458f6c6fb6f84892ec5eb87ebf5593679a9e426d51b72c7b59df0002ddb4f4f 0.009308 | |
5. FlyingDutchman a9f6d578447da0af238608830c63e541c42d8dcc9d417c5e3b85463f62279c1a 0.009308 | |
6. MiningCenter 201b965be4f49da21502dcfd1b1af77bb8eb88f693d4adb9f4b0cc5e61151753 0.009308 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Summary of the PegNet 51% attack on 4/21/2020 | |
============================================= | |
TL;DR: A miner or group of miners with more than 51% of hashpower submitted an | |
artificially inflated price for JPY, turning ~1,265.79 pJPY (~11.79 USD) into | |
~6.7mm pUSD, then tried to liquidate as much as they could on exchanges. | |
Timeline: | |
Block 241369 | |
The address FA2dZeSVXZMVzGMGMqG5vhgoQ7J6LUjguQjC5RKTf7nRcFk9KvEj |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Paying addresses for miners: | |
EC2JjmeDhvtSv5BP3CbGjtdQ6VNm5BZkc5ATcaJkUnvNMy9T2NbU (miningcenter) | |
funded by: | |
FA32WsZvT5Zg5RtdTPJi2gMV6MyoMR7UzHZSaq5T8o19P7ZVBLZh (109.510827 FCT from Bittrex) | |
EC3KJEYPYJU2cNEarYv5Vc5yrEZpQTJFmUxJEqkN9jevJX46tXYD (bOrax) | |
funded by: | |
FA2fYmopjFjDZcwMsfPxgPrwWYeqVQQXJF6yHGXC4GxNDwAn17Fj (215.33960528 FCT from Bittrex) | |
EC2uMJoqoyHSPw8cijhwxvdWMw8QeV49uYEKQMDkVFV9yVCaLRGJ (hedgehogs united) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
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 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[app] | |
Network = CUSTOM | |
CustomNetworkPort = 8110 | |
CustomSeedURL = "" | |
CustomSpecialPeers = "" | |
CustomBootstrapIdentity = 8888881111111111111111111111111111111111111111111111111111111111 | |
CustomBootstrapKey = a997bdaf2a8519fdc227ae8084afe77f24402275f6e3fc9a48ce0bf3760a4f75 | |
ExchangeRateAuthorityPublicKey = a997bdaf2a8519fdc227ae8084afe77f24402275f6e3fc9a48ce0bf3760a4f75 |
OlderNewer