INTERNET COMPUTER
Cycles / s 
Cycles / s

This is the rate at which cycles are being burned by the network.

Cycles are the digital fuel that powers computation on the network, and they disappear when consumed. When a user buys using a credit card, the payment provider purchases ICP tokens behind the scenes, converts them into cycles, and then charges up the user's hosted software or cloud engines.

1 trillion cycles is worth 1 XDR (known as a Special Drawing Right/SDR), a currency defined by the IMF. 1 XDR is worth about $1.44 USD.

Network market cap 
Network market cap

The network market cap is the number of ICP tokens multiplied by their price. Network users convert ICP tokens into cycles that are burned and disappear (deflation), and they are generated by the network to remunerate node providers operating nodes, and by some participants in network governance (inflation).

ICP tokens exist within network protocol, and enable it to create a network economy without central points of failure.

  • Quick start
  • Documentation▾
  • Build▾
  • Spotlight▾
  • News▾
  • Network▾
  • DFINITY↗
01
§ Wiki · Topic1 entry

#security

Other topics
  • #alerting
  • #architecture
  • #asus
  • #bios
  • #bmc
  • #chain-fusion
  • #cloud-engine
  • #compliance
  • #concept
  • #core-concept
  • #cryptography
  • #data-center
  • #decentralization
  • #dell
  • #deployment
  • #dns
  • #economics
  • #faq
  • #firmware
  • #gen-1
  • #gen-2
  • #gigabyte
  • #governance
  • #hardening
  • #hardware
  • #hsm
  • #ic-os
  • #idrac
  • #infrastructure
  • #ipmi
  • #ipv4
  • #ipv6
  • #legal
  • #maas
  • #maintenance
  • #monitoring
  • #networking
  • #nitrokey
  • #nns
  • #node-provider
  • #onboarding
  • #operations
  • #operator
  • #procurement
  • #protocol
  • #proxmox
  • #recovery
  • #registry
  • #remuneration
  • #rewards
  • #rmu
  • #runbook
  • #sovereignty
  • #supermicro
  • #teleport
  • #troubleshooting
  • #uefi
  • #useful-work
  • May 4, 2026·3 min

    Decentralization and Security Guide

    Operational practices that node providers should follow to defend the Internet Computer's decentralization — independence, supply-chain hygiene, physical security, and key handling.

©2026 Internet Computer
Terms & policiesPrivacy policyPress kit
Source code
github.com/dfinity/ic
XYoutubeMediumGitHubRedditCMC