Bitcoin Forum
February 16, 2026, 09:08:36 AM *
News: Community awards 2025
 
   Home   Help Search Login Register More  
Pages: « 1 ... 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 [629] 630 631 632 633 634 635 636 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 369129 times)
GonzAlex
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
January 21, 2026, 01:59:48 PM
 #12561

Has anyone found a hash of 160 starting with f6f5431d25bbf5.... and f6f5431d25bbf6....? I'm starting to think that maybe such hashes don't exist in the 71-bit range.
kTimesG
Full Member
***
Offline Offline

Activity: 742
Merit: 227


View Profile
January 21, 2026, 02:39:18 PM
 #12562

Has anyone found a hash of 160 starting with f6f5431d25bbf5.... and f6f5431d25bbf6....? I'm starting to think that maybe such hashes don't exist in the 71-bit range.

Right, they don't exist because you scanned a ton of keys, got bored, got broke, maybe burned some hardware in the process, melted some CPUs, and therefore  the obvious conclusion is "yeah, bro, the hash is rigged".

Some basic mental math says that the chances that no such hashes exist in the 70-bit space of Puzzle 71 is lower than 0.001%, and that you'll actually find tens of thousands of them.

Assuming Puzzle 71's legit, then the chances are zero (because a 100% guarantee means 0% of missing guarantee).

Off the grid, training pigeons to broadcast signed messages.
0xastraeus
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
January 21, 2026, 03:47:10 PM
 #12563

Has anyone found a hash of 160 starting with f6f5431d25bbf5.... and f6f5431d25bbf6....? I'm starting to think that maybe such hashes don't exist in the 71-bit range.

Why should we care about prefixes? f6f5431d25bbf is 100% in range due to puzzle hash being f6f5431d25bbf7b12e8add9af5e3475c44a0a5b8. Why would you think f6f5431d25bbf(4..5..6) etc is in puzzle range, it could be anywhere on the curve.

Prefixes give ZERO indication how close you are to the target.
GonzAlex
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
January 21, 2026, 04:07:22 PM
 #12564

Has anyone found a hash of 160 starting with f6f5431d25bbf5.... and f6f5431d25bbf6....? I'm starting to think that maybe such hashes don't exist in the 71-bit range.

Why should we care about prefixes? f6f5431d25bbf is 100% in range due to puzzle hash being f6f5431d25bbf7b12e8add9af5e3475c44a0a5b8. Why would you think f6f5431d25bbf(4..5..6) etc is in puzzle range, it could be anywhere on the curve.

Prefixes give ZERO indication how close you are to the target.

Personally, prefixes are important to me. They help me quickly find other private keys with the prefix f6f5431d25bbf.
You personally shouldn't be concerned. Continue searching the full range from start to finish to avoid accidentally missing the key you're looking for.
Besides you, there are people on this forum who also compile their own prefix lists.
The question was addressed to them.
goresat2025
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
January 21, 2026, 05:28:48 PM
 #12565

Yes i remember that database, the idea is cool, but as we me talk before the problem is the search speed, I think in different workarounds over that idea but none of them was efficient, I am going to think on it again, maybe some mix between a custom bloom-filter and some bit rotation can make it work, but I don't know final speed until I test it.
...

If the btc was truly taken by bots, then the original finder of 66 is a DUMMY, lol. I gave them step by step instructions on how to avoid the bots. If that is the case and the btc was stolen, they must be on su*cide watch by now.

Also, stop taking your bot offline albert0!!! lol.

For the database, I was able to use it with a faster version of BSGS versus the one mcd first put out on repo, but python only. So it was still "slow" compared to yours or others written in C++/PB, but it was able to use the smaller db with no issues.

can you tel me where to see method to avoid bots
i want to learn  this
0xastraeus
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
January 21, 2026, 05:43:49 PM
 #12566

Here you go @goresat2025
 
The death of the monitoring bots for the low bit challenge/puzzles such as the 66, 67, 68 bits.
The sure fire way to get all of your hard earned 6.6 BTC into one of your safe wallets...or is it a sure fire way?
Let me know what you think.

Ok, so here is the current, thoughtout way to beat the bots when dealing with the puzzle/challenge low bit wallets.

I tried this on my first test, but it didn't quire work. I thought it was probably because I fat fingered something, although I knew I didn't.

Turned out to be a lack of monitoring, possibly.

I did run a follow up test (privately) with success, and also had someone else test the process. They encountered what I first encountered and had to send a gentle reminder, lol. More on this below.

So I know of two tests, that have worked, so I am laying this out here so maybe someone can shoot holes in it, and/or whoever solves the 66 bit challenge, can rest a little easy.

What I would do if I found the 66 bit key.

First:
Take the 66 bit found key and import it into whatever wallet. In my tests, I used electrum (older version because I can unselect RBF, just in case). You can use whatever wallet (as long as it allows you to export a signed raw transaction hex.)

Second:
Go to Go to https://slipstream.mara.com/ and see what their current minimum fee rate is.

Third:
Now, create a payment to a safe wallet of yours (From the found, imported, 66 bit wallet.)  
Go through all of the pay options in your particular wallet, pay to, amount, fee, and sign. (Make sure your transaction fee covers the minimum over at slipstream.) BUT DO NOT BROADCAST.

Fourth:
Export the signed transaction, save it somewhere safe and that you will remember. Electrum allows this but I am not sure about every wallet.

Fifth:
Now, open that exported transaction document and you should see something like this (using one that albert0 posted earlier, just as an example:
01000000029e8c8c0f85d43b8d6aa7d41a0d6f45d67c0f003a4285f3046bf8413b14cf557801000 0006a473044022019defb9f5402b1458982ba7e60813ee8824c8882a9551741c20a883895c3f783 02200fcc27f0040c519723edc792bd3a08911618c4e33f1ba06f2edf2362b1f332a80121029a3a2 ae3ad3858cf49421e6ff547598bb8da72c2bce50490067d9ce7b2e2dc90ffffffff

or it could start with a 02
02000000029e8c8c0f85d43b8d6aa7d41a0d6f45d67c0f003a4285f3046bf8413b14cf557801000 0006a473044022019defb9f5402b1458982ba7e60813ee8824c8882a9551741c20a883895c3f783 02200fcc27f0040c519723edc792bd3a08911618c4e33f1ba06f2edf2362b1f332a80121029a3a2 ae3ad3858cf49421e6ff547598bb8da72c2bce50490067d9ce7b2e2dc90ffffffff

Sixth:
Copy that raw transaction.

Seventh:
Head back over to https://slipstream.mara.com/ and paste that raw transaction into the applicable space and select the "Activate Slipstream" button. You should now receive a confirmation message like this:
"In Marathon's mempool, waiting to be mined. You can view the status here."

Eighth:
Select on that view status here button from above. This will open up a new window and will show your tx's status in their mempool and the Transaction ID.

Ninth:
Copy that transaction ID from above and save it somehwhere you will remember.

Ok, now you have successfully bypassed the regular mempool, or have you? Just sit back and wait for the transaction to be mined into Mara's next block, right? It depends...

On my first test, my tx just sat there for days, block after mined block lol. I eventually "cancelled" it.

But I did reach out to slipstream via their email and asked questions, such as, had I done something wrong, not big enough fee, etc. But now since my transaction was gone from their mempool, I didn't get an answer.
So I ran another test, ensuring no fat fingers, and still nothing. So I reached back out to slipsteam again, but this time I had my tx id (from eighth step) and I included that into the email I sent them, and low and behold, the transaction was included in
their next mined block.

The other individual who ran the test (and I did not warn them because I wanted to see if they had the same results as me) had to do the same thing; email slipstream, and then their tx was included into Mara's next mined block.

So I am not sure if they just don't monitor the transactions entered into their site because there aren't many or what. I did reach back out to them via email and waiting for a reply.

Either way, that is two tests completed with the process above with expected results/outcome.

So is this the death of the monitoring bots? You tell me.

The sent from address's tx is never sent to the mempool, exposing its public key. Only after it has been mined into a block, is it exposed.

Thoughts, comments, questions?



crytoestudo
Newbie
*
Offline Offline

Activity: 36
Merit: 0


View Profile
January 21, 2026, 06:59:25 PM
 #12567

I've already mentioned this several times here on the forum, just search for it, MARA
Yes i remember that database, the idea is cool, but as we me talk before the problem is the search speed, I think in different workarounds over that idea but none of them was efficient, I am going to think on it again, maybe some mix between a custom bloom-filter and some bit rotation can make it work, but I don't know final speed until I test it.
...

If the btc was truly taken by bots, then the original finder of 66 is a DUMMY, lol. I gave them step by step instructions on how to avoid the bots. If that is the case and the btc was stolen, they must be on su*cide watch by now.

Also, stop taking your bot offline albert0!!! lol.

For the database, I was able to use it with a faster version of BSGS versus the one mcd first put out on repo, but python only. So it was still "slow" compared to yours or others written in C++/PB, but it was able to use the smaller db with no issues.

can you tel me where to see method to avoid bots
i want to learn  this
kTimesG
Full Member
***
Offline Offline

Activity: 742
Merit: 227


View Profile
January 21, 2026, 09:10:58 PM
 #12568

Personally, prefixes are important to me. They help me quickly find other private keys with the prefix f6f5431d25bbf.

The magic circle astro-numerological voodoo method is also very good at finding patterns very quickly. Have you tried it?

Pretty much the same solid scientific ground (and results) as prefixes.

Off the grid, training pigeons to broadcast signed messages.
GonzAlex
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
January 21, 2026, 10:28:04 PM
 #12569

Personally, prefixes are important to me. They help me quickly find other private keys with the prefix f6f5431d25bbf.

The magic circle astro-numerological voodoo method is also very good at finding patterns very quickly. Have you tried it?

Pretty much the same solid scientific ground (and results) as prefixes.

I'm not trying to push my opinion here that prefixes are important and that you should look for them...
I've been on the forum for a long time, and there are people here who find prefixes.
I'll repeat myself! My question is for them: have they found them?

I tried the magic circle. It pointed me to people on the forum with dumb humor and inappropriate sarcasm. So I expected those kinds of answers to my question.  Smiley
parcok
Newbie
*
Offline Offline

Activity: 17
Merit: 0


View Profile
January 22, 2026, 01:20:19 AM
 #12570

Just ignore them, they feel too much like they have become puzzle gods in this forum, thinking that no one knows more about solving techniques than them. In fact, they haven't been able to solve this puzzle for years. That's the fact that they are stupid enough to accept things beyond their knowledge.

Personally, prefixes are important to me. They help me quickly find other private keys with the prefix f6f5431d25bbf.

The magic circle astro-numerological voodoo method is also very good at finding patterns very quickly. Have you tried it?

Pretty much the same solid scientific ground (and results) as prefixes.

I'm not trying to push my opinion here that prefixes are important and that you should look for them...
I've been on the forum for a long time, and there are people here who find prefixes.
I'll repeat myself! My question is for them: have they found them?

I tried the magic circle. It pointed me to people on the forum with dumb humor and inappropriate sarcasm. So I expected those kinds of answers to my question.  Smiley
Bram24732
Member
**
Offline Offline

Activity: 280
Merit: 27


View Profile
January 22, 2026, 03:43:31 AM
 #12571

Just ignore them, they feel too much like they have become puzzle gods in this forum, thinking that no one knows more about solving techniques than them. In fact, they haven't been able to solve this puzzle for years. That's the fact that they are stupid enough to accept things beyond their knowledge.

Personally, prefixes are important to me. They help me quickly find other private keys with the prefix f6f5431d25bbf.

The magic circle astro-numerological voodoo method is also very good at finding patterns very quickly. Have you tried it?

Pretty much the same solid scientific ground (and results) as prefixes.

I'm not trying to push my opinion here that prefixes are important and that you should look for them...
I've been on the forum for a long time, and there are people here who find prefixes.
I'll repeat myself! My question is for them: have they found them?

I tried the magic circle. It pointed me to people on the forum with dumb humor and inappropriate sarcasm. So I expected those kinds of answers to my question.  Smiley

Maybe we should just stop calling this a puzzle ?

I solved 67 and 68 using custom software distributing the load across ~25k GPUs. 4090 stocks speeds : ~8.1Bkeys/sec. Don’t challenge me technically if you know shit about fuck, I’ll ignore you. Same goes if all you can do is LLM reply.
parcok
Newbie
*
Offline Offline

Activity: 17
Merit: 0


View Profile
January 22, 2026, 04:23:33 AM
 #12572

Wooow there is Mr. 67 68, perhaps we can call him the god of puzzles. With the power of 25K GPU in his hands, he is probably equal to Snap Tanos, who is able to wipe out most creatures in the universe. Shocked

Just ignore them, they feel too much like they have become puzzle gods in this forum, thinking that no one knows more about solving techniques than them. In fact, they haven't been able to solve this puzzle for years. That's the fact that they are stupid enough to accept things beyond their knowledge.

Personally, prefixes are important to me. They help me quickly find other private keys with the prefix f6f5431d25bbf.

The magic circle astro-numerological voodoo method is also very good at finding patterns very quickly. Have you tried it?

Pretty much the same solid scientific ground (and results) as prefixes.

I'm not trying to push my opinion here that prefixes are important and that you should look for them...
I've been on the forum for a long time, and there are people here who find prefixes.
I'll repeat myself! My question is for them: have they found them?

I tried the magic circle. It pointed me to people on the forum with dumb humor and inappropriate sarcasm. So I expected those kinds of answers to my question.  Smiley

Maybe we should just stop calling this a puzzle ?
Bram24732
Member
**
Offline Offline

Activity: 280
Merit: 27


View Profile
January 22, 2026, 07:10:43 AM
 #12573

Wooow there is Mr. 67 68, perhaps we can call him the god of puzzles. With the power of 25K GPU in his hands, he is probably equal to Snap Tanos, who is able to wipe out most creatures in the universe. Shocked

Way too intense, as usual.
Also, it’s spelled Thanos.

I solved 67 and 68 using custom software distributing the load across ~25k GPUs. 4090 stocks speeds : ~8.1Bkeys/sec. Don’t challenge me technically if you know shit about fuck, I’ll ignore you. Same goes if all you can do is LLM reply.
parcok
Newbie
*
Offline Offline

Activity: 17
Merit: 0


View Profile
January 22, 2026, 08:18:43 AM
 #12574

not Thanos but tan Or shit yellow (feces)

Wooow there is Mr. 67 68, perhaps we can call him the god of puzzles. With the power of 25K GPU in his hands, he is probably equal to Snap Tanos, who is able to wipe out most creatures in the universe. Shocked

Way too intense, as usual.
Also, it’s spelled Thanos.

goresat2025
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
January 22, 2026, 10:19:18 AM
 #12575

Here you go @goresat2025
 
The death of the monitoring bots for the low bit challenge/puzzles such as the 66, 67, 68 bits.
The sure fire way to get all of your hard earned 6.6 BTC into one of your safe wallets...or is it a sure fire way?
Let me know what you think.

...


thank you

this also apply to key 71, bot can brute force private key in seconds with pubkey?
or it takes time? like haf hour
[/color]
kTimesG
Full Member
***
Offline Offline

Activity: 742
Merit: 227


View Profile
January 22, 2026, 11:17:53 AM
 #12576

this also apply to key 71, bot can brute force private key in seconds with pubkey?
or it takes time? like haf hour
[/color]

Hundreds of milliseconds (less than a second, to be clear for some people around here).

Off the grid, training pigeons to broadcast signed messages.
0xastraeus
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
January 22, 2026, 12:53:44 PM
 #12577

Who knew somebody with "cok" in their name could handle it and take it so well...relax buddy

not Thanos but tan Or shit yellow (feces)

Wooow there is Mr. 67 68, perhaps we can call him the god of puzzles. With the power of 25K GPU in his hands, he is probably equal to Snap Tanos, who is able to wipe out most creatures in the universe. Shocked

Way too intense, as usual.
Also, it’s spelled Thanos.

0xastraeus
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
January 22, 2026, 01:00:22 PM
 #12578

There's some people here who's sole purpose is to monitor and use their bots to snipe and replace the transaction. As of right now, it still applies for this range.

this also apply to key 71, bot can brute force private key in seconds with pubkey?
or it takes time? like haf hour
[/color]

Hundreds of milliseconds (less than a second, to be clear for some people around here).
SecretAdmirere
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
January 22, 2026, 03:29:20 PM
 #12579

Does anyone have benchmark data for a 1080 Ti GPU running multiple publicly available programs? I have been unable to find comprehensive results.

The closest I found is on the website https://btcpuzzle.info/benchmark, which lists 652 million k/s for VanitySearch and BitCrack. Another source, https://github.com/sp-hash/Bitcrack/releases, claims 705 million k/s. There is also a forum topic started by Zielar (https://bitcointalk.org/index.php?topic=5218972.msg53649803#msg53649803) that claims 900 million k/s - though I suspect that figure uses endomorphism, which is useless for a specific range search.

I have compiled and run many of these publicly available tools myself but could not achieve key rates close to the claimed figures. Has anyone run a different program on a 1080 Ti and obtained a benchmark number?

With the program I developed, I can achieve a stable 760 to 775 million k/s on stock settings and power target (250W max power draw), varying slightly with GPU temperature. By simply unlocking the power target from 100% to 110%, I get a stable 800 million k/s. Increasing it to 150% allows me to reach 850 million k/s on my 1080 Ti.

I want to know if I am approaching the maximum limit of what the 1080 Ti can do, which is why I am asking.

For clarity, when I refer to keys per second (k/s), I mean hash160 comparisons per second. I am tracking the number of comparisons performed against a target hash160.
stillhere@2009
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
January 22, 2026, 04:48:40 PM
 #12580

Does anyone have benchmark data for a 1080 Ti GPU running multiple publicly available programs? I have been unable to find comprehensive results.

The closest I found is on the website https://btcpuzzle.info/benchmark, which lists 652 million k/s for VanitySearch and BitCrack. Another source, https://github.com/sp-hash/Bitcrack/releases, claims 705 million k/s. There is also a forum topic started by Zielar (https://bitcointalk.org/index.php?topic=5218972.msg53649803#msg53649803) that claims 900 million k/s - though I suspect that figure uses endomorphism, which is useless for a specific range search.

I have compiled and run many of these publicly available tools myself but could not achieve key rates close to the claimed figures. Has anyone run a different program on a 1080 Ti and obtained a benchmark number?

With the program I developed, I can achieve a stable 760 to 775 million k/s on stock settings and power target (250W max power draw), varying slightly with GPU temperature. By simply unlocking the power target from 100% to 110%, I get a stable 800 million k/s. Increasing it to 150% allows me to reach 850 million k/s on my 1080 Ti.

I want to know if I am approaching the maximum limit of what the 1080 Ti can do, which is why I am asking.

For clarity, when I refer to keys per second (k/s), I mean hash160 comparisons per second. I am tracking the number of comparisons performed against a target hash160.


make sure your program is working correctly
Pages: « 1 ... 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 [629] 630 631 632 633 634 635 636 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!