Bitcoin Forum
May 04, 2026, 12:53:18 AM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 [623] 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 383145 times)
kTimesG
Full Member
***
Offline

Activity: 826
Merit: 249


View Profile
January 07, 2026, 12:13:34 PM
 #12441

I tested pool 135 t.me/puzzle135, and after winning the 115-bit reward, I was not paid the reward.

If someone can explain to me how to attach files I'll attach the whole conversation with the administrator.

PLEASE BE CAREFUL

What did you expect? Did you miss my PSA about not doing this, and about how shady the guy was (not even understanding basic things about algorithms, hiding Python code in executables, etc)?

You simply contributed to his DP database for P135, like all the other participants. Even if he ever pays you back for your obvious costs (losses at this point).

For anyone thinking "oh, but DPs for a 115 bits puzzle don't work for 135": use your brain.

Off the grid, training pigeons to broadcast signed messages.
filo1992
Newbie
*
Offline

Activity: 42
Merit: 0


View Profile
January 07, 2026, 12:22:17 PM
Last edit: January 07, 2026, 08:26:08 PM by Mr. Big
 #12442

I tested pool 135, and after winning the 115-bit reward, I was not paid the reward.

If someone can explain to me how to attach files I'll attach the whole conversation with the administrator.

PLEASE BE CAREFUL

What kind of pool is it?What scanning software are they using for the pool you mentioned? How many GPUs did you use to find puzzle 115?
Are you sure it's a puzzle with a known public key? Nowadays, online public pools are all address based puzzle pools.



You can use   imgbb.com

Effective time: 30 days.

Except that after modifying the program to no avail, I rebooted my entire system with 17 GPUs and new settings, and in 4 days I found the solution.



I tested pool 135 t.me/puzzle135, and after winning the 115-bit reward, I was not paid the reward.

If someone can explain to me how to attach files I'll attach the whole conversation with the administrator.

PLEASE BE CAREFUL

What did you expect? Did you miss my PSA about not doing this, and about how shady the guy was (not even understanding basic things about algorithms, hiding Python code in executables, etc)?

You simply contributed to his DP database for P135, like all the other participants. Even if he ever pays you back for your obvious costs (losses at this point).

For anyone thinking "oh, but DPs for a 115 bits puzzle don't work for 135": use your brain.

I know it's a hard lesson to learn, but at least there's actual evidence of the pool system being unfair.
sxiclub
Newbie
*
Offline

Activity: 25
Merit: 0


View Profile
January 07, 2026, 12:32:20 PM
 #12443

What kind of pool is it?What scanning software are they using for the pool you mentioned? How many GPUs did you use to find puzzle 115?
Are you sure it's a puzzle with a known public key? Nowadays, online public pools are all address based puzzle pools.

You can use   imgbb.com
Seems to be a pool of Russian origin, or at least the participants in the Telegram channel speak Russian. In this thread, user Torin Keepler promoted the $200 challenge for finding a 115-bit PVK.
ee1234ee
Jr. Member
*
Offline

Activity: 50
Merit: 1


View Profile
January 07, 2026, 12:36:52 PM
 #12444

What kind of pool is it?What scanning software are they using for the pool you mentioned? How many GPUs did you use to find puzzle 115?
Are you sure it's a puzzle with a known public key? Nowadays, online public pools are all address based puzzle pools.

You can use   imgbb.com
Seems to be a pool of Russian origin, or at least the participants in the Telegram channel speak Russian. In this thread, user Torin Keepler promoted the $200 challenge for finding a 115-bit PVK.


A privately initiated challenge for only $200
I thought it was problem 115? Unfortunately, I am unable to manage my Telegram account as I am unable to access it.
optioncmdPR
Newbie
*
Offline

Activity: 40
Merit: 0


View Profile
January 07, 2026, 02:25:01 PM
 #12445

The puzzles are solved first by application of logic on its respective bitspace boundaries,
yielding the first few bytes of the specifically designed key and substantially increasing
the viability of solving the remainder of the key using brute force.
Lets apply this claim to puzzle 64 as a real life example.
note: arbitrary calculation for full precision is necessary

        LOGIC
Divide upper boundary by lower boundary:
set decimal precision to twice the expected digit length of the private key , -1.
In this example, then, 38 digits for precision.

Upper boundary: 2^64 -1  18446744073709551615   
Lower boundary: 2^63      9223372036854775808

   18446744073709551615 ÷ 9223372036854775808
=  1.99999999999999999989157978275144955659

To quote the creator "the odds of guessing any private key with balance is like
winning powerball , 9 times in a row "

So we next take the first 20 least significant bits, reassign the decimal point,
and raise to the power of 9, divide the result by two.  The first 4 bytes( -1 at end byte ) are
the beginning of private key.   



take first 20 least significant bits    1.99999999999999999989157978275144955659
                                                                                      ^^^^^^^^^^^^^^^^
 
              reassign decimal point      .89157978275144955659
                                                    ^   

                 raise to 9th power         .89157978275144955659^9
 
                                                    .355993368271774728639363164404970728311
           
                        divide by 2            .1779966841358873643196815822024853641555
                                                     ^^^^^^
                 
                   first 4 bytes -1            17799667xxxxxxxxxxxx
                                                              ( trivial brute-force )
          brute force the remainder

         fun: should you increase the precision on calculations will notice familiar bytes for the # 65 key
                If you look at the key # 63 calculations will see bytes for # 64 etc..  In summary , with enough
                insight , the keys are absolutely 100% solve able by logic. There is more to be unearthed. Dont give up!     
GinnyBanzz
Jr. Member
*
Offline

Activity: 185
Merit: 6


View Profile
January 07, 2026, 03:31:04 PM
 #12446

The puzzles are solved first by application of logic on its respective bitspace boundaries,
yielding the first few bytes of the specifically designed key and substantially increasing
the viability of solving the remainder of the key using brute force.
Lets apply this claim to puzzle 64 as a real life example.
note: arbitrary calculation for full precision is necessary

        LOGIC
Divide upper boundary by lower boundary:
set decimal precision to twice the expected digit length of the private key , -1.
In this example, then, 38 digits for precision.

Upper boundary: 2^64 -1  18446744073709551615   
Lower boundary: 2^63      9223372036854775808

   18446744073709551615 ÷ 9223372036854775808
=  1.99999999999999999989157978275144955659

To quote the creator "the odds of guessing any private key with balance is like
winning powerball , 9 times in a row "

So we next take the first 20 least significant bits, reassign the decimal point,
and raise to the power of 9, divide the result by two.  The first 4 bytes( -1 at end byte ) are
the beginning of private key.   



take first 20 least significant bits    1.99999999999999999989157978275144955659
                                                                                      ^^^^^^^^^^^^^^^^
 
              reassign decimal point      .89157978275144955659
                                                    ^   

                 raise to 9th power         .89157978275144955659^9
 
                                                    .355993368271774728639363164404970728311
           
                        divide by 2            .1779966841358873643196815822024853641555
                                                     ^^^^^^
                 
                   first 4 bytes -1            17799667xxxxxxxxxxxx
                                                              ( trivial brute-force )
          brute force the remainder

         fun: should you increase the precision on calculations will notice familiar bytes for the # 65 key
                If you look at the key # 63 calculations will see bytes for # 64 etc..  In summary , with enough
                insight , the keys are absolutely 100% solve able by logic. There is more to be unearthed. Dont give up!     


The keys are absolutely NOT 100% solvable by logic, that's a ridiculous thing to suggest.
ArtificialLove
Newbie
*
Offline

Activity: 24
Merit: 2


View Profile
January 07, 2026, 05:40:12 PM
 #12447

Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters)
There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.

Thanks!
optioncmdPR
Newbie
*
Offline

Activity: 40
Merit: 0


View Profile
January 07, 2026, 06:43:06 PM
 #12448

The puzzles are solved first by application of logic on its respective bitspace boundaries,
yielding the first few bytes of the specifically designed key and substantially increasing
the viability of solving the remainder of the key using brute force.
Lets apply this claim to puzzle 64 as a real life example.
note: arbitrary calculation for full precision is necessary

        LOGIC
Divide upper boundary by lower boundary:
set decimal precision to twice the expected digit length of the private key , -1.
In this example, then, 38 digits for precision.

Upper boundary: 2^64 -1  18446744073709551615   
Lower boundary: 2^63      9223372036854775808

   18446744073709551615 ÷ 9223372036854775808
=  1.99999999999999999989157978275144955659

To quote the creator "the odds of guessing any private key with balance is like
winning powerball , 9 times in a row "

So we next take the first 20 least significant bits, reassign the decimal point,
and raise to the power of 9, divide the result by two.  The first 4 bytes( -1 at end byte ) are
the beginning of private key.   



take first 20 least significant bits    1.99999999999999999989157978275144955659
                                                                                      ^^^^^^^^^^^^^^^^
 
              reassign decimal point      .89157978275144955659
                                                    ^   

                 raise to 9th power         .89157978275144955659^9
 
                                                    .355993368271774728639363164404970728311
           
                        divide by 2            .1779966841358873643196815822024853641555
                                                     ^^^^^^
                 
                   first 4 bytes -1            17799667xxxxxxxxxxxx
                                                              ( trivial brute-force )
          brute force the remainder

         fun: should you increase the precision on calculations will notice familiar bytes for the # 65 key
                If you look at the key # 63 calculations will see bytes for # 64 etc..  In summary , with enough
                insight , the keys are absolutely 100% solve able by logic. There is more to be unearthed. Dont give up!     


The keys are absolutely NOT 100% solvable by logic, that's a ridiculous thing to suggest.
Well I don't believe that the described " deterministic wallet" has anything to do with ecdsa or 32 byte ECC points, and that is why I am able to entertain such outrageous absurdities. ( good sir )
0xastraeus
Newbie
*
Offline

Activity: 38
Merit: 0


View Profile
January 07, 2026, 06:52:32 PM
 #12449

Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters)
There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.

Thanks!

Are you talking about something like this:
Code:
import random

BIT_GAP = 2 ** 26

first = random.getrandbits(70) | (1 << 70)
second = first + BIT_GAP
print(f"{first:x}:{second:x}")

outputs:
Code:
69a9101cbb05e768d8:69a9101cbb09e768d8

it's going to search from 69a9101cbb05e768d8:69a9101cbb09e768d8
ArtificialLove
Newbie
*
Offline

Activity: 24
Merit: 2


View Profile
January 07, 2026, 07:57:57 PM
 #12450

Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters)
There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.

Thanks!

Are you talking about something like this:
Code:
import random

BIT_GAP = 2 ** 26

first = random.getrandbits(70) | (1 << 70)
second = first + BIT_GAP
print(f"{first:x}:{second:x}")

outputs:
Code:
69a9101cbb05e768d8:69a9101cbb09e768d8

it's going to search from 69a9101cbb05e768d8:69a9101cbb09e768d8


Something rather like VanitySearch, KeyHunt, etc. or at least something like SolVanityGen (Python + OpenCL) where I can keep modifying the Python code or enter new masks with every search, I couldn't find anything, except for that old repository for KeyScanner which had exactly that but then the whole thing was abandoned it seems.

Thanks for your earlier answer by the way, and also FixedPaul, appreciated.
0xastraeus
Newbie
*
Offline

Activity: 38
Merit: 0


View Profile
January 07, 2026, 08:17:15 PM
 #12451

Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters)
There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.

Thanks!

Are you talking about something like this:
Code:
import random

BIT_GAP = 2 ** 26

first = random.getrandbits(70) | (1 << 70)
second = first + BIT_GAP
print(f"{first:x}:{second:x}")

outputs:
Code:
69a9101cbb05e768d8:69a9101cbb09e768d8

it's going to search from 69a9101cbb05e768d8:69a9101cbb09e768d8


Something rather like VanitySearch, KeyHunt, etc. or at least something like SolVanityGen (Python + OpenCL) where I can keep modifying the Python code or enter new masks with every search, I couldn't find anything, except for that old repository for KeyScanner which had exactly that but then the whole thing was abandoned it seems.

Thanks for your earlier answer by the way, and also FixedPaul, appreciated.

No problem,

the only actual program I can think of that does something similar would be ecloop https://github.com/vladkens/ecloop and using the -d offset:size flag. If you want a cuda program you may have to grab the source and do it yourself or stick with python to create the range and use subprocess to call whatever program you want.

but here's an example of ecloop -d:
Code:
./ecloop rnd -f data/btc-puzzles-hash -d 20:32 -r 400000000000000000:7fffffffffffffffff -o ./found_71.txt
threads: 12 ~ addr33: 1 ~ addr65: 0 ~ endo: 0 | filter: list (160)
----------------------------------------
[RANDOM MODE] offs: 20 ~ bits: 32

0000000000000000 0000000000000000 000000000000006c 730000000001e0a6
0000000000000000 0000000000000000 000000000000006c 730ffffffff1e0a6
ArtificialLove
Newbie
*
Offline

Activity: 24
Merit: 2


View Profile
January 07, 2026, 08:50:55 PM
 #12452

Thanks for that, looks difficult or impossible to create a mask with that.

I think there's really nothing, just that one attempt (KeyScanner) and then nothing. I wish someone like FixedPull could point out where in his VanitySearch fork we can do that. I was looking at his code and it seems to be doable, just needs that Random_K.Rand(256) to be replaced, probably together with whatever else that happens to it (i.e. Random_K) but I don't have enough reasons to spend a whole lot of time on this.
optioncmdPR
Newbie
*
Offline

Activity: 40
Merit: 0


View Profile
January 08, 2026, 03:13:14 AM
 #12453

Puzzle 71 is 2.36 sextillion possibilities.

Lets assume euromillion odds, that 1 in 140 million.

A 4090 should be capable of 6 billion keys/second.

That means, if you run it constantly, then approx every 47 minutes you have the equivalent chances of a single euro millions ticket.

1/140.000.000=7e^-9
2^70/6.000.000.000 /28s =7e^-9

47 minutes? Am I doing something wrong? It shows 28 seconds...

Anyway, it has to be caled gambling Smiley

BR
Damian

Ahhh, maths is not my strong point, think I miscalculated somewhere lol.

Well, 28seconds is far better odds, still gambling, but some semblance of a chance.

However, you'd need to calculate power costs to determine if its more financially feasible to try to crack the puzzle or just buy a bunch of euro millions tickets every week.

puzzle 71 only has 1.18 sextillion possibilities inside of its range:  the first possibility starting at   1180591620717411303424 with eligible integers up to 2361183241434822606847,  therefor a search space of 1180591620717411303423 candidates.
parcok
Newbie
*
Offline

Activity: 17
Merit: 0


View Profile
January 08, 2026, 04:36:26 AM
Last edit: January 08, 2026, 05:51:19 AM by parcok
 #12454

I only have a low-spec GPU to help me find the key to puzzle #71. I divided the range 40000000000000000:7ffffffffffffffffff
which will produce the data to be tried: 1,180,591,620,717,411,303,424.
Then I divided it into 4,398,046,511,104 for 1 running batch, resulting in 270,000,000 running batches. Then I divided 270,000,000 into fbatches, where 1 fbatch contains 2,000,000 running batches. so that it produces 135 fbatch.. storing as many as 270,000,000 running batches with 135 fbatch groupings in the sql server database, and I created a search program that directly updates the status of each running batch being searched, so I can freely do leapfrog searches wherever I want, and I don't lose the log of my search results.. because everything is automatically updated to the database that I have.
If you are interested, please check out my project in the following github repository: https://github.com/bgarz929/btcpuzzle71
crytoestudo
Newbie
*
Offline

Activity: 38
Merit: 0


View Profile
January 08, 2026, 01:19:42 PM
Last edit: January 14, 2026, 01:03:59 PM by crytoestudo
 #12455

That looks cool, could you make the code available for review? There are only photos on GitHub.

I only have a low-spec GPU to help me find the key to puzzle #71. I divided the range 40000000000000000:7ffffffffffffffffff
which will produce the data to be tried: 1,180,591,620,717,411,303,424.
Then I divided it into 4,398,046,511,104 for 1 running batch, resulting in 270,000,000 running batches. Then I divided 270,000,000 into fbatches, where 1 fbatch contains 2,000,000 running batches. so that it produces 135 fbatch.. storing as many as 270,000,000 running batches with 135 fbatch groupings in the sql server database, and I created a search program that directly updates the status of each running batch being searched, so I can freely do leapfrog searches wherever I want, and I don't lose the log of my search results.. because everything is automatically updated to the database that I have.
If you are interested, please check out my project in the following github repository: https://github.com/bgarz929/btcpuzzle71
nomachine
Full Member
***
Offline

Activity: 840
Merit: 135



View Profile
January 08, 2026, 01:44:50 PM
 #12456

If you are interested, please check out my project in the following github repository: https://github.com/bgarz929/btcpuzzle71

Fascinating project. The screenshots look great, but I assume the code lives in a parallel universe where Puzzle 71 is solvable. Any plans to merge that universe with this repo?  Grin

BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
anonimsl
Newbie
*
Offline

Activity: 2
Merit: 0


View Profile
January 08, 2026, 03:38:04 PM
 #12457

Good afternoon, everyone! I am a schoolboy from Russia who is interested in cryptography. I have been familiar with this puzzle for about a year and have spent a lot of time thinking about how to solve it, even though it turned out to be futile — it's still a wonderful experience.

I recently wrote a popular science article on a Russian-language forum to promote the puzzle and the ECDLP problem in particular.

I would be very happy if someone knowledgeable about this topic would read and honestly evaluate my article, because unfortunately it has not gained much popularity.
If anyone is interested, here is a link - https://overclockers.ru/blog/anonimsl/show/245871/Bitkoin-golovolomka
Thanks Smiley
Wanderingaran
Newbie
*
Offline

Activity: 45
Merit: 0


View Profile
January 08, 2026, 04:14:40 PM
 #12458

If anyone is interested, here is a link - https://overclockers.ru/blog/anonimsl/show/245871/Bitkoin-golovolomka
Thanks Smiley

The writing has a consistent, explanatory tone with logical flow, which could be human-written. However, the structured sections and lack of personal anecdotes might suggest AI assistance. The technical accuracy and absence of errors lean towards human expertise, possibly with AI editing. I'd estimate around 70% human, 30% AI, given the clarity but formulaic structure. Smiley
Akito S. M. Hosana
Jr. Member
*
Offline

Activity: 448
Merit: 8


View Profile
January 08, 2026, 04:26:29 PM
 #12459

70% human, 30% AI

sounds like my last Facebook date  Tongue
anonimsl
Newbie
*
Offline

Activity: 2
Merit: 0


View Profile
January 08, 2026, 04:36:31 PM
 #12460

If anyone is interested, here is a link - https://overclockers.ru/blog/anonimsl/show/245871/Bitkoin-golovolomka
Thanks Smiley

The writing has a consistent, explanatory tone with logical flow, which could be human-written. However, the structured sections and lack of personal anecdotes might suggest AI assistance. The technical accuracy and absence of errors lean towards human expertise, possibly with AI editing. I'd estimate around 70% human, 30% AI, given the clarity but formulaic structure. Smiley
Thank you, I really only used AI to search for information (it's more convenient than collecting it from various sources, forums, etc.) and to generate images. Initially, I created a specific outline for the entire article, after which I started writing each paragraph, all this was done manually. As for the "personal stories", I wanted to provide the reader with a general view of the puzzle, without any personal coloring or opinion. However, I added some personal thoughts and philosophy there to dilute the dry technical text) I would give 85% of my work and 15% of AI's help.
Pages: « 1 ... 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 [623] 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!