Qubic Mining Recap (Epoch 169)
Written by
retrodrive
Jul 17, 2025
Epoch Summary (TL;DR):
Monero Earnings: $129.2K, with 282 XMR sold
QUBIC Burned: 88.51 billion at an average of 1,335 QUBIC per B
Peak Hashrate: 1.15 GH/s, reaching 21% of global Monero hashrate
Total Monero Blocks Found: 2,197
Hashrate Trend: Qubic’s Monero hashrate remains strong, with steady upward growth
Custom Mining Sprint: 100% of compute power dedicated to custom mining on Saturday, a full 24-hour cycle of pure mining
Tari ($XTM): All holdings sold during this epoch
Mining Profitability: Qubic continues to be top most profitable CPU mined coin
Security Event: Qubic’s Monero mining infrastructure came under a DDoS attack


Revenue Snapshot
Qubic’s custom mining generated $129.219 in Monero earnings this epoch, selling 282 XMR into the market. With Monero’s price dynamics at play, the average QUBIC burn rate was 1460 per B, amounting to 88.51 billion QUBIC burned, a significant deflationary signal for coin holders.
Performance Highlights
The network’s peak hashrate held strong at 1.15 GH/s, accounting for 21% of the total Monero network hashrate, increasing from the previous epoch. This shows growing compute contribution as the algorithm evolves to make CPU mining more efficient and profitable.
Qubic’s total Monero blocks found reached 2197, a remarkable testament to the network’s mining consistency and growing influence in the Monero ecosystem.
Profitability Against Peers
Qubic continues to be the most profitable CPU-mined coin. Below is the breakdown of the metrics maintained by our valued community member Eko in Qubic Discord.
With a total profit of $8.34 over 7 days (based on recent Epoch 169), Qubic remains the most profitable CPU-mined coin compared to alternatives:
Qubic: $1.19/day
Monero+Tari: $0.70/day
Monero: $0.57/day
Tari: $0.75/day
Price Reference:
Qubic price: $0.00000154
Monero (XMR) price: $338.00
Tari price: $0.0077
Detailed Epoch 169 Stats:
Qubic shares: 65 × 24,787 = 1,611,155 Qu’s (Approximately)
XMR shares: 720 × 5,283 = 3,803,760 Qu’s
Total Qu’s earned: 5,414,915 Qu’s
Total USD value: 5,414,915 × $0.00000154 = $8.34
Daily average: $8.34 ÷ 7 = $1.19/day
Other Coin Daily Stats:
Tari: 98 coins/day × $0.0077 = $0.75/day
Monero + Tari (merge mining): $0.57 (XMR) + $0.13 (Tari) ≈ $0.70/day (Approximately)
*Based on CPU mining (Ryzen 7950X), Qubic was mined on the QLI Pool


Why This Matters
Qubic is more than just another mining experiment. It’s a glimpse into a future where decentralized AI and compute infrastructure can monetize idle resources in real-time. By leveraging Useful Proof of Work (uPoW) and incentivizing valuable work, Qubic is turning raw processing power into tangible earnings, all while burning QUBIC to fuel economic sustainability.
As we move closer to mainstream adoption, each epoch reinforces Qubic’s promise: a more democratic, AI-powered economy where your compute works for you.
Stay tuned. This is just the beginning.
Incident Summary – Attempted Disruption of Qubic Monero Mining Infrastructure
This past Sunday, several validators (Computors) reported that their servers came under heavy and coordinated attack. This included classic Distributed Denial of Service (DDoS) techniques, duplicated nonce floods, and a range of other anomalous behaviors likely designed to destabilize the Monero mining ecosystem running on Qubic.
The attackers appeared to target the top-performing Qubic mining pools, likely aiming to either disrupt service availability or manipulate network share processing. A significant number of mining shares were withheld or delayed, then submitted all at once to the dispatcher. This caused a sudden and artificial spike in Hashrate.
Despite this, the core XMR node cluster and dispatcher software held up well under pressure. While some blocks were found during the attack window, no critical damage or data loss occurred, and the infrastructure remained functionally intact.
This incident serves as a reminder of the resilience of the current system, but also highlights the need for ongoing hardening against unconventional attack vectors such as nonce replay floods, delayed submission batching, and network-based throttling attempts.
For more information: