|
kTimesG
|
 |
January 07, 2026, 12:13:34 PM |
|
I tested pool 135 t.me/puzzle135, and after winning the 115-bit reward, I was not paid the reward.
If someone can explain to me how to attach files I'll attach the whole conversation with the administrator.
PLEASE BE CAREFUL
What did you expect? Did you miss my PSA about not doing this, and about how shady the guy was (not even understanding basic things about algorithms, hiding Python code in executables, etc)? You simply contributed to his DP database for P135, like all the other participants. Even if he ever pays you back for your obvious costs (losses at this point). For anyone thinking "oh, but DPs for a 115 bits puzzle don't work for 135": use your brain.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
filo1992
Newbie

Activity: 42
Merit: 0
|
 |
January 07, 2026, 12:22:17 PM Last edit: January 07, 2026, 08:26:08 PM by Mr. Big |
|
I tested pool 135, and after winning the 115-bit reward, I was not paid the reward.
If someone can explain to me how to attach files I'll attach the whole conversation with the administrator.
PLEASE BE CAREFUL
What kind of pool is it?What scanning software are they using for the pool you mentioned? How many GPUs did you use to find puzzle 115? Are you sure it's a puzzle with a known public key? Nowadays, online public pools are all address based puzzle pools. You can use imgbb.com Effective time: 30 days. Except that after modifying the program to no avail, I rebooted my entire system with 17 GPUs and new settings, and in 4 days I found the solution.
I tested pool 135 t.me/puzzle135, and after winning the 115-bit reward, I was not paid the reward.
If someone can explain to me how to attach files I'll attach the whole conversation with the administrator.
PLEASE BE CAREFUL
What did you expect? Did you miss my PSA about not doing this, and about how shady the guy was (not even understanding basic things about algorithms, hiding Python code in executables, etc)? You simply contributed to his DP database for P135, like all the other participants. Even if he ever pays you back for your obvious costs (losses at this point). For anyone thinking "oh, but DPs for a 115 bits puzzle don't work for 135": use your brain. I know it's a hard lesson to learn, but at least there's actual evidence of the pool system being unfair.
|
|
|
|
|
sxiclub
Newbie

Activity: 25
Merit: 0
|
 |
January 07, 2026, 12:32:20 PM |
|
What kind of pool is it?What scanning software are they using for the pool you mentioned? How many GPUs did you use to find puzzle 115? Are you sure it's a puzzle with a known public key? Nowadays, online public pools are all address based puzzle pools.
You can use imgbb.com
Seems to be a pool of Russian origin, or at least the participants in the Telegram channel speak Russian. In this thread, user Torin Keepler promoted the $200 challenge for finding a 115-bit PVK.
|
|
|
|
|
ee1234ee
Jr. Member

Activity: 50
Merit: 1
|
 |
January 07, 2026, 12:36:52 PM |
|
What kind of pool is it?What scanning software are they using for the pool you mentioned? How many GPUs did you use to find puzzle 115? Are you sure it's a puzzle with a known public key? Nowadays, online public pools are all address based puzzle pools.
You can use imgbb.com
Seems to be a pool of Russian origin, or at least the participants in the Telegram channel speak Russian. In this thread, user Torin Keepler promoted the $200 challenge for finding a 115-bit PVK. A privately initiated challenge for only $200 I thought it was problem 115? Unfortunately, I am unable to manage my Telegram account as I am unable to access it.
|
|
|
|
|
optioncmdPR
Newbie

Activity: 40
Merit: 0
|
 |
January 07, 2026, 02:25:01 PM |
|
The puzzles are solved first by application of logic on its respective bitspace boundaries, yielding the first few bytes of the specifically designed key and substantially increasing the viability of solving the remainder of the key using brute force. Lets apply this claim to puzzle 64 as a real life example. note: arbitrary calculation for full precision is necessary
LOGIC Divide upper boundary by lower boundary: set decimal precision to twice the expected digit length of the private key , -1. In this example, then, 38 digits for precision.
Upper boundary: 2^64 -1 18446744073709551615 Lower boundary: 2^63 9223372036854775808
18446744073709551615 ÷ 9223372036854775808 = 1.99999999999999999989157978275144955659
To quote the creator "the odds of guessing any private key with balance is like winning powerball , 9 times in a row "
So we next take the first 20 least significant bits, reassign the decimal point, and raise to the power of 9, divide the result by two. The first 4 bytes( -1 at end byte ) are the beginning of private key.
take first 20 least significant bits 1.99999999999999999989157978275144955659 ^^^^^^^^^^^^^^^^ reassign decimal point .89157978275144955659 ^
raise to 9th power .89157978275144955659^9 .355993368271774728639363164404970728311 divide by 2 .1779966841358873643196815822024853641555 ^^^^^^ first 4 bytes -1 17799667xxxxxxxxxxxx ( trivial brute-force ) brute force the remainder
fun: should you increase the precision on calculations will notice familiar bytes for the # 65 key If you look at the key # 63 calculations will see bytes for # 64 etc.. In summary , with enough insight , the keys are absolutely 100% solve able by logic. There is more to be unearthed. Dont give up!
|
|
|
|
|
GinnyBanzz
Jr. Member

Activity: 185
Merit: 6
|
 |
January 07, 2026, 03:31:04 PM |
|
The puzzles are solved first by application of logic on its respective bitspace boundaries, yielding the first few bytes of the specifically designed key and substantially increasing the viability of solving the remainder of the key using brute force. Lets apply this claim to puzzle 64 as a real life example. note: arbitrary calculation for full precision is necessary
LOGIC Divide upper boundary by lower boundary: set decimal precision to twice the expected digit length of the private key , -1. In this example, then, 38 digits for precision.
Upper boundary: 2^64 -1 18446744073709551615 Lower boundary: 2^63 9223372036854775808
18446744073709551615 ÷ 9223372036854775808 = 1.99999999999999999989157978275144955659
To quote the creator "the odds of guessing any private key with balance is like winning powerball , 9 times in a row "
So we next take the first 20 least significant bits, reassign the decimal point, and raise to the power of 9, divide the result by two. The first 4 bytes( -1 at end byte ) are the beginning of private key.
take first 20 least significant bits 1.99999999999999999989157978275144955659 ^^^^^^^^^^^^^^^^ reassign decimal point .89157978275144955659 ^
raise to 9th power .89157978275144955659^9 .355993368271774728639363164404970728311 divide by 2 .1779966841358873643196815822024853641555 ^^^^^^ first 4 bytes -1 17799667xxxxxxxxxxxx ( trivial brute-force ) brute force the remainder
fun: should you increase the precision on calculations will notice familiar bytes for the # 65 key If you look at the key # 63 calculations will see bytes for # 64 etc.. In summary , with enough insight , the keys are absolutely 100% solve able by logic. There is more to be unearthed. Dont give up!
The keys are absolutely NOT 100% solvable by logic, that's a ridiculous thing to suggest.
|
|
|
|
|
ArtificialLove
Newbie

Activity: 24
Merit: 2
|
 |
January 07, 2026, 05:40:12 PM |
|
Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters) There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.
Thanks!
|
|
|
|
|
optioncmdPR
Newbie

Activity: 40
Merit: 0
|
 |
January 07, 2026, 06:43:06 PM |
|
The puzzles are solved first by application of logic on its respective bitspace boundaries, yielding the first few bytes of the specifically designed key and substantially increasing the viability of solving the remainder of the key using brute force. Lets apply this claim to puzzle 64 as a real life example. note: arbitrary calculation for full precision is necessary
LOGIC Divide upper boundary by lower boundary: set decimal precision to twice the expected digit length of the private key , -1. In this example, then, 38 digits for precision.
Upper boundary: 2^64 -1 18446744073709551615 Lower boundary: 2^63 9223372036854775808
18446744073709551615 ÷ 9223372036854775808 = 1.99999999999999999989157978275144955659
To quote the creator "the odds of guessing any private key with balance is like winning powerball , 9 times in a row "
So we next take the first 20 least significant bits, reassign the decimal point, and raise to the power of 9, divide the result by two. The first 4 bytes( -1 at end byte ) are the beginning of private key.
take first 20 least significant bits 1.99999999999999999989157978275144955659 ^^^^^^^^^^^^^^^^ reassign decimal point .89157978275144955659 ^
raise to 9th power .89157978275144955659^9 .355993368271774728639363164404970728311 divide by 2 .1779966841358873643196815822024853641555 ^^^^^^ first 4 bytes -1 17799667xxxxxxxxxxxx ( trivial brute-force ) brute force the remainder
fun: should you increase the precision on calculations will notice familiar bytes for the # 65 key If you look at the key # 63 calculations will see bytes for # 64 etc.. In summary , with enough insight , the keys are absolutely 100% solve able by logic. There is more to be unearthed. Dont give up!
The keys are absolutely NOT 100% solvable by logic, that's a ridiculous thing to suggest. Well I don't believe that the described " deterministic wallet" has anything to do with ecdsa or 32 byte ECC points, and that is why I am able to entertain such outrageous absurdities. ( good sir )
|
|
|
|
|
0xastraeus
Newbie

Activity: 38
Merit: 0
|
 |
January 07, 2026, 06:52:32 PM |
|
Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters) There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.
Thanks!
Are you talking about something like this: import random
BIT_GAP = 2 ** 26
first = random.getrandbits(70) | (1 << 70) second = first + BIT_GAP print(f"{first:x}:{second:x}")
outputs: 69a9101cbb05e768d8:69a9101cbb09e768d8 it's going to search from 69a9101cbb0 5e768d8:69a9101cbb0 9e768d8
|
|
|
|
|
ArtificialLove
Newbie

Activity: 24
Merit: 2
|
 |
January 07, 2026, 07:57:57 PM |
|
Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters) There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.
Thanks!
Are you talking about something like this: import random
BIT_GAP = 2 ** 26
first = random.getrandbits(70) | (1 << 70) second = first + BIT_GAP print(f"{first:x}:{second:x}")
outputs: 69a9101cbb05e768d8:69a9101cbb09e768d8 it's going to search from 69a9101cbb0 5e768d8:69a9101cbb0 9e768d8 Something rather like VanitySearch, KeyHunt, etc. or at least something like SolVanityGen (Python + OpenCL) where I can keep modifying the Python code or enter new masks with every search, I couldn't find anything, except for that old repository for KeyScanner which had exactly that but then the whole thing was abandoned it seems. Thanks for your earlier answer by the way, and also FixedPaul, appreciated.
|
|
|
|
|
0xastraeus
Newbie

Activity: 38
Merit: 0
|
 |
January 07, 2026, 08:17:15 PM |
|
Is there anything that would allow you to use a mask for the random hexadecimals? e.g. --keyspace rrrrBrrrr:rrrrFrrrr (where r is random characters) There's a project on GitHub called "KeyScanner" and its older tags show such a feature but it appears abandoned since, I was also wondering about Python and OpenCL, is there anything? There's one for Sol inspired by VanityGen but nothing for BTC, which is weird.
Thanks!
Are you talking about something like this: import random
BIT_GAP = 2 ** 26
first = random.getrandbits(70) | (1 << 70) second = first + BIT_GAP print(f"{first:x}:{second:x}")
outputs: 69a9101cbb05e768d8:69a9101cbb09e768d8 it's going to search from 69a9101cbb0 5e768d8:69a9101cbb0 9e768d8 Something rather like VanitySearch, KeyHunt, etc. or at least something like SolVanityGen (Python + OpenCL) where I can keep modifying the Python code or enter new masks with every search, I couldn't find anything, except for that old repository for KeyScanner which had exactly that but then the whole thing was abandoned it seems. Thanks for your earlier answer by the way, and also FixedPaul, appreciated. No problem, the only actual program I can think of that does something similar would be ecloop https://github.com/vladkens/ecloop and using the -d offset:size flag. If you want a cuda program you may have to grab the source and do it yourself or stick with python to create the range and use subprocess to call whatever program you want. but here's an example of ecloop -d: ./ecloop rnd -f data/btc-puzzles-hash -d 20:32 -r 400000000000000000:7fffffffffffffffff -o ./found_71.txt threads: 12 ~ addr33: 1 ~ addr65: 0 ~ endo: 0 | filter: list (160) ---------------------------------------- [RANDOM MODE] offs: 20 ~ bits: 32
0000000000000000 0000000000000000 000000000000006c 730000000001e0a6 0000000000000000 0000000000000000 000000000000006c 730ffffffff1e0a6
|
|
|
|
|
ArtificialLove
Newbie

Activity: 24
Merit: 2
|
 |
January 07, 2026, 08:50:55 PM |
|
Thanks for that, looks difficult or impossible to create a mask with that.
I think there's really nothing, just that one attempt (KeyScanner) and then nothing. I wish someone like FixedPull could point out where in his VanitySearch fork we can do that. I was looking at his code and it seems to be doable, just needs that Random_K.Rand(256) to be replaced, probably together with whatever else that happens to it (i.e. Random_K) but I don't have enough reasons to spend a whole lot of time on this.
|
|
|
|
|
optioncmdPR
Newbie

Activity: 40
Merit: 0
|
 |
January 08, 2026, 03:13:14 AM |
|
Puzzle 71 is 2.36 sextillion possibilities.
Lets assume euromillion odds, that 1 in 140 million.
A 4090 should be capable of 6 billion keys/second.
That means, if you run it constantly, then approx every 47 minutes you have the equivalent chances of a single euro millions ticket.
1/140.000.000=7e^-9 2^70/6.000.000.000 /28s =7e^-9 47 minutes? Am I doing something wrong? It shows 28 seconds... Anyway, it has to be caled gambling  BR Damian Ahhh, maths is not my strong point, think I miscalculated somewhere lol. Well, 28seconds is far better odds, still gambling, but some semblance of a chance. However, you'd need to calculate power costs to determine if its more financially feasible to try to crack the puzzle or just buy a bunch of euro millions tickets every week. puzzle 71 only has 1.18 sextillion possibilities inside of its range: the first possibility starting at 1180591620717411303424 with eligible integers up to 2361183241434822606847, therefor a search space of 1180591620717411303423 candidates.
|
|
|
|
|
parcok
Newbie

Activity: 17
Merit: 0
|
 |
January 08, 2026, 04:36:26 AM Last edit: January 08, 2026, 05:51:19 AM by parcok |
|
I only have a low-spec GPU to help me find the key to puzzle #71. I divided the range 40000000000000000:7ffffffffffffffffff which will produce the data to be tried: 1,180,591,620,717,411,303,424. Then I divided it into 4,398,046,511,104 for 1 running batch, resulting in 270,000,000 running batches. Then I divided 270,000,000 into fbatches, where 1 fbatch contains 2,000,000 running batches. so that it produces 135 fbatch.. storing as many as 270,000,000 running batches with 135 fbatch groupings in the sql server database, and I created a search program that directly updates the status of each running batch being searched, so I can freely do leapfrog searches wherever I want, and I don't lose the log of my search results.. because everything is automatically updated to the database that I have. If you are interested, please check out my project in the following github repository: https://github.com/bgarz929/btcpuzzle71
|
|
|
|
|
crytoestudo
Newbie

Activity: 38
Merit: 0
|
 |
January 08, 2026, 01:19:42 PM Last edit: January 14, 2026, 01:03:59 PM by crytoestudo |
|
That looks cool, could you make the code available for review? There are only photos on GitHub.I only have a low-spec GPU to help me find the key to puzzle #71. I divided the range 40000000000000000:7ffffffffffffffffff which will produce the data to be tried: 1,180,591,620,717,411,303,424. Then I divided it into 4,398,046,511,104 for 1 running batch, resulting in 270,000,000 running batches. Then I divided 270,000,000 into fbatches, where 1 fbatch contains 2,000,000 running batches. so that it produces 135 fbatch.. storing as many as 270,000,000 running batches with 135 fbatch groupings in the sql server database, and I created a search program that directly updates the status of each running batch being searched, so I can freely do leapfrog searches wherever I want, and I don't lose the log of my search results.. because everything is automatically updated to the database that I have. If you are interested, please check out my project in the following github repository: https://github.com/bgarz929/btcpuzzle71
|
|
|
|
|
|
nomachine
|
 |
January 08, 2026, 01:44:50 PM |
|
Fascinating project. The screenshots look great, but I assume the code lives in a parallel universe where Puzzle 71 is solvable. Any plans to merge that universe with this repo? 
|
BTC: bc1qdwnxr7s08xwelpjy3cc52rrxg63xsmagv50fa8
|
|
|
anonimsl
Newbie

Activity: 2
Merit: 0
|
 |
January 08, 2026, 03:38:04 PM |
|
Good afternoon, everyone! I am a schoolboy from Russia who is interested in cryptography. I have been familiar with this puzzle for about a year and have spent a lot of time thinking about how to solve it, even though it turned out to be futile — it's still a wonderful experience. I recently wrote a popular science article on a Russian-language forum to promote the puzzle and the ECDLP problem in particular. I would be very happy if someone knowledgeable about this topic would read and honestly evaluate my article, because unfortunately it has not gained much popularity. If anyone is interested, here is a link - https://overclockers.ru/blog/anonimsl/show/245871/Bitkoin-golovolomkaThanks 
|
|
|
|
|
Wanderingaran
Newbie

Activity: 45
Merit: 0
|
 |
January 08, 2026, 04:14:40 PM |
|
The writing has a consistent, explanatory tone with logical flow, which could be human-written. However, the structured sections and lack of personal anecdotes might suggest AI assistance. The technical accuracy and absence of errors lean towards human expertise, possibly with AI editing. I'd estimate around 70% human, 30% AI, given the clarity but formulaic structure. 
|
|
|
|
|
Akito S. M. Hosana
Jr. Member

Activity: 448
Merit: 8
|
 |
January 08, 2026, 04:26:29 PM |
|
70% human, 30% AI
sounds like my last Facebook date 
|
|
|
|
|
anonimsl
Newbie

Activity: 2
Merit: 0
|
 |
January 08, 2026, 04:36:31 PM |
|
The writing has a consistent, explanatory tone with logical flow, which could be human-written. However, the structured sections and lack of personal anecdotes might suggest AI assistance. The technical accuracy and absence of errors lean towards human expertise, possibly with AI editing. I'd estimate around 70% human, 30% AI, given the clarity but formulaic structure.  Thank you, I really only used AI to search for information (it's more convenient than collecting it from various sources, forums, etc.) and to generate images. Initially, I created a specific outline for the entire article, after which I started writing each paragraph, all this was done manually. As for the "personal stories", I wanted to provide the reader with a general view of the puzzle, without any personal coloring or opinion. However, I added some personal thoughts and philosophy there to dilute the dry technical text) I would give 85% of my work and 15% of AI's help.
|
|
|
|
|
|