Height
Hashrate
Difficulty
Nodes
Block Time
Connecting...
← tsnchain.com
Miner Relay
Recent Blocks
PeerID
Height
Version
Click for full details

Dashboard

Block Height
Difficulty
numeric difficulty
Hashrate
Block Time
average
Peers
Mempool
Total Supply
Total Transactions

Hashrate (recent)

Block Time (recent)

Transactions (recent)

Latest Blocks Live
HeightHashTxsTimeDifficulty
Mempool 0 TX
📭 No pending transactions

All Blocks

Block Explorer
HeightHashTxsRewardTimeDifficulty

Transactions

Recent Transactions
TX HashBlockTypeNullifiersCommitmentsFeeTime

Charts

Hashrate

Difficulty

Block Time

Transactions per Block

Chain Statistics

Post-Quantum Security

TSN is built from the ground up to resist quantum computer attacks

ML-DSA-65

Digital Signatures

NIST-standardized lattice-based signature scheme (formerly Dilithium). Replaces ECDSA/Ed25519 with quantum-resistant signatures for all transactions.

Security LevelNIST Level 3
Public Key1,952 bytes
Signature3,293 bytes
Quantum SafeYes

Plonky3 STARKs

Zero-Knowledge Proofs

Transparent, post-quantum zero-knowledge proofs. No trusted setup required. Used for privacy-preserving transaction validation.

Proof SystemSTARK
Trusted SetupNone
FieldGoldilocks (64-bit)
Quantum SafeYes

Poseidon2

Hash Function

Algebraic hash function optimized for ZK circuits. Used in Merkle trees for commitments and nullifiers, providing efficient in-circuit hashing.

TypeAlgebraic Hash
Optimized ForZK Circuits
State Width12 elements
Quantum SafeYes

MIK Protocol

Privacy Layer

Custom shielded transaction protocol using commitments and nullifiers. Enables private transfers with zero-knowledge proofs of validity.

CommitmentsPedersen-like
NullifiersDeterministic
Privacy ModelFull shielded
Quantum SafeYes
Quantum Resistance Comparison
FeatureBitcoinEthereumMoneroTSN
SignaturesECDSAECDSAEd25519ML-DSA-65
ZK ProofsNoneSNARKs (opt.)BulletproofsPlonky3 STARKs
Hash FunctionSHA-256KeccakKeccakPoseidon2
PrivacyTransparentTransparentRing SigsMIK (ZK Shielded)
Quantum SafeNoNoNoFull Stack
How a Shielded Transaction Works
1
Create Note
Sender creates a shielded note with value, recipient key, and randomness
2
Generate Proof
Plonky3 STARK proves validity without revealing amount or recipient
3
Commit & Nullify
Poseidon2 commitment added to tree, old note's nullifier published
4
Sign & Broadcast
ML-DSA-65 signature ensures authenticity, TX broadcasted to network

TSN Explorer API

Public REST API for querying the TSN blockchain

Base URL: https://explorer.tsnchain.com
Loading snapshots...

Block Height
Version
Signatures
ML-DSA-65
Hash Function
Poseidon2
ZK Proofs
Plonky3 STARKs
Sync
Synced
Data Source
--