An Umbrel community app that runs a Stacks mainnet follower node, anchored to your own Umbrel Bitcoin node as the burnchain backend.
By LUC1AS
Stacks is a Bitcoin layer for smart contracts and decentralised apps. Every Stacks block is anchored to a Bitcoin block, giving Stacks transactions Bitcoin-grade finality.
- No extra Bitcoin node needed — reuses your existing Umbrel Bitcoin app
- Official image —
ghcr.io/stacks-network/stacks-core:3.4.0.0.1 - Hiro Sync — on first install, automatically downloads and extracts the latest Hiro mainnet snapshot so your node is ready in minutes instead of days
- Init container — renders
Config.tomlat startup from Umbrel's injected env vars - Non-conflicting ports — exposes
21443(RPC) and21444(P2P) to avoid clashes with other community Stacks apps - Healthcheck — Umbrel can monitor node liveness via
/v2/info - MIT licensed — clean-room implementation
- Umbrel with the Bitcoin app installed and fully synced
- Open your Umbrel dashboard
- Go to App Store → Community App Stores
- Paste the URL:
https://github.com/LUC1AS/stacks-node - Click Add Store, then install Stacks Node
cp .env.example .env
# Edit .env with your Bitcoin node RPC credentials
docker compose --env-file .env up -d| Port | Protocol | Description |
|---|---|---|
| 21443 | TCP | Stacks RPC API |
| 21444 | TCP | Stacks P2P |
Once running, the Stacks RPC API is available at:
http://<your-umbrel-ip>:21443/v2/info
Common endpoints:
| Endpoint | Description |
|---|---|
/v2/info |
Node info, burn block height, stacks tip |
/v2/accounts/<address> |
Account balance and nonce |
/v2/transactions |
Broadcast signed transactions |
/v2/fees/transfer |
Estimated fee for STX transfer |
Full API reference: docs.hiro.so/api
Recommended Security Practices:
- Restrict exposed ports: By default, the Stacks RPC (21443) and P2P (21444) ports are open to all interfaces. Use a firewall to restrict access to trusted IP addresses only.
- Protect your credentials: Never share your
.envfile or Bitcoin RPC credentials. Use environment variables and secure storage. - Network isolation: Run your node on a trusted, private network. Avoid exposing RPC endpoints to the public internet.
- Enable SSL/TLS: If you must access the RPC API remotely, consider enabling SSL/TLS for encrypted communication.
- Keep dependencies updated: Regularly update your Docker images and dependencies to receive the latest security patches.
- Monitor logs: Watch for unusual activity in your node and Docker logs.
For more information, see the Stacks documentation and Umbrel security best practices.