- The Internet Computer Protocol (ICP) has reached the Levitron milestone, enabling real-time public access to API boundary node logs.
- These newly public logs show all external requests to the network but do not reveal user identities or request payloads.
- Data available to developers and analysts includes method calls, response status codes, client IDs, cache status, and error information.
- Log streaming is decentralized, allowing direct subscriptions from the Internet Computer without intermediaries.
- Instructions and a sample client are available, with further improvements planned including hardware-based log attestation in future upgrades.
DFINITY has announced the completion of the Levitron milestone, marking a significant advancement for the Internet Computer Protocol (ICP). Starting today, API boundary node (API BN) access logs—showing every external request entering the network—are openly available for public streaming. This rollout intends to improve transparency and provide detailed operational information for developers and users of the Internet Computer.
Previously, access to these logs was restricted. With this change, anyone can now subscribe to and stream real-time logs from API boundary nodes through a dedicated endpoint. The system operates in a decentralized manner, so data is obtained directly from the network without a central authority or intermediary.
According to information published by DFINITY, API BNs serve as the public interface point for all traffic into the Internet Computer. Each request—such as those directed at hosted “canisters” (smart contracts)—is recorded. These logs display useful details for each request, such as which method was called, the response’s status code, the identity of the client (as a salted, anonymized hash), whether the response was served from cache, any error codes, and the size of the data transferred.
“For the first time, developers can observe the full spectrum of canister interactions, including query calls, which were previously not visible,” the announcement stated. DFINITY also notes that while these logs offer in-depth network usage insights, they maintain privacy by excluding actual payloads, IP addresses, sender principals, and other sensitive information. The only personal identifier, the “client ID,” is a salted hash rotated monthly, protecting user Anonymity.
Real-time log streaming covers current activity only; the system does not supply historical data. Those interested in long-term analytics must collect and store logs themselves for future examination. Guidance and a working example client are provided in the Internet Computer’s documentation and official GitHub repository.
DFINITY indicates that, with upcoming updates such as SEV-SNP (a hardware security technology), users will soon be able to verify the authenticity and integrity of logs through remote attestation. Additional technical details and future developments can be found in the platform’s official documentation.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
Previous Articles:
- MoonPay Launches Global Solana Staking With 8.49% APY Offer
- io.net Launches Training as a Service for Models and Agents
- Bitcoin Volatility Hits Record Correlation With Wall Street’s VIX
- PayPal to Link Global Wallets, UPI, WeChat Pay This Fall
- Judge Allows Disputed Testimony in Tornado Cash Co-Founder Trial