Skip To Content

provenance logoProvenance

Blockdaemon offers institutional-grade Provenance infrastructure, on-chain data and staking services.

Whether you’re a developer that needs end-to-end managed nodes or you’re a financial institution that wants to earn maximum yield on your assets with validator nodes, we have you covered.

  • Staking Rewards (est) Variable
  • Minimum Amount to Stake 1 HASH
  • Public Fee Talk to Sales
  • Unbonding Period 21 days
  • Network Type
    • Mainnet
    • PoS
    • Public
  • Blockdaemon Products
    • Nodes
    • Staking
  • Hosting
    • Hybrid

Staking

  • White-Label Validator

    Blockdaemon lets anyone run their own validator node and white-label it in their own name. Our white-label validator nodes are non-custodial (you keep your keys private), fully maintained/monitored, run at 99.9% uptime and have manual-failover built-in, eliminating double-signing. Blockdaemon’s market leading node performance is focused on meeting the high demands of large institutional banks, custodians and exchanges. Protecting your assets is critical to Blockdaemon and to mitigate risk we’ve established slashing insurance, provided by Marsh.

Nodes

  • Dedicated Nodes

    We've been perfecting Nodes-as-a-Service since 2017. All our Dedicated RPC Nodes are built for zero downtime and high security. Our nodes are supported by optional High-Availability Clusters, offering secure backups and helping you manage unforeseen load spikes. Lastly, every machine we manage comes with 24/7 support and transparent service level agreements.

Connecting institutions to blockchains with one integration.

Supporting 60+ cutting edge blockchain networks with world-class blockchain infrastructure. We power the blockchain economy with an easy-to-use, secure and scalable node management platform.

Trusted By

  • Salesforce
  • Softbank
  • boldstart

Have a question? We’re here to help!

Let's Talk

Name(Required)

Frequently Asked Questions

  • Absolutely. Blockdaemon has earned the ISO 27001 Certification for Information Security Management.

    In addition we’re fully compliant with AML/KYC policies. Take a closer look at the specifics here or watch this overview:

We don't support Internet Explorer

Please use Chrome, Safari, Firefox, or Edge to view this site.