Tachyon Protocol is a decentralized internet protocol that powers a next-gen VPN network.
Calculate how much you can earn by staking Tachyon Protocol. Results vary based on the staking amount, term, and type selected.
Revenue over time (USD / week)
Total Reward Rate
0%or 0% annualized
Est. Monthly Earning
Est. Yearly Earning
- What is Tachyon IPX Staking?
- How to stake Tachyon IPX?
- How much can i expect to earn staking Tachyon IPX?
- Is there any risk stake Tachyon IPX?
- What is Tachyon Protocol?
IPX Staking System is an incentive system that enables an open, transparent, and competitive bandwidth marketplace. With this system, Node Providers are able to earn rewards by staking and selling bandwidth to global users. IPX Staking System is self-governed by all of its participants, and can ensure a stable supply of bandwidth for Tachyon VPN.
For now, you can join IPX Staking on the sites developed and run by Tachyon Platform Partners like ipxus.com. Platform Partners offer servers and help to run your own node. No tech skills are needed so anyone can join easily. Follow 3 simples steps:
1. Stake 20,000–200,000 IPX token per node.
2. Get your servers from Platform Partners like ipxus.com.
3. Start staking and earn node incentive rewards.
Node Providers who create and run nodes by themselves can also join staking on Node Manager 2.0 in July.
Apart from regular staking rewards generated from the system, Node Incentives also include variable session rewards based on the contribution made to the core system. The more VPN traffic you provide, the more session rewards the Node Provider can get. You earn inflation rewards + session rewards. Inflation is currently 5% and session rewards depend on the actual usage within the network. You can estimate your rewards with certain variables in our Tachyon IPX Staking Calculator.
As long as you protect your private keys and back them up, there is no additional risk for staking IPX.
Tachyon Protocol is a decentralized network stack combining decentralization and encryption techniques; it is designed to reconstruct the TCP/IP stack by means of decentralized structure, end-to-end encryption, traffic concealing, multi-path routing, and multi-relaying scheme.