Bitcoin Forum
May 04, 2024, 09:43:18 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 [162] 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 ... 250 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 185915 times)
tarmi
Legendary
*
Offline Offline

Activity: 1218
Merit: 1010


View Profile
August 17, 2023, 06:49:44 PM
Last edit: August 17, 2023, 10:23:19 PM by Mr. Big
 #3221

I have experience working with multibit wallets. Maybe I can help.

The wallet itself is lost. Dave Bitcoin has been working on it since early 2014, bruteforce of the entire range up to 10 characters has been attempted.
At one point, KeychainX found a false positive using the words i gave him, but it was just that - a false positive.

My only remaining options at this point are to handle this like solving the puzzles, but with my own wallet  Undecided



Pollard Kangaroo approach is for the know private key range and for the best, within 125 bit range and of course since you have the Multibit wallet handy all you have to do is "Once you located the files, if you have access to an old multibit app on you computer you need to import the wallet and export the private keys to a new wallet. If you do not have a copy of Multibit, you can use OpenSSL together with your password to decrypt the files and recover the keys."

You need the password to export them. I still have the wallet open every single day since then.
I just keep looking at what value i've missed out on Smiley
1714858998
Hero Member
*
Offline Offline

Posts: 1714858998

View Profile Personal Message (Offline)

Ignore
1714858998
Reply with quote  #2

1714858998
Report to moderator
The network tries to produce one block per 10 minutes. It does this by automatically adjusting how difficult it is to produce blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714858998
Hero Member
*
Offline Offline

Posts: 1714858998

View Profile Personal Message (Offline)

Ignore
1714858998
Reply with quote  #2

1714858998
Report to moderator
1714858998
Hero Member
*
Offline Offline

Posts: 1714858998

View Profile Personal Message (Offline)

Ignore
1714858998
Reply with quote  #2

1714858998
Report to moderator
digaran
Copper Member
Hero Member
*****
Offline Offline

Activity: 1330
Merit: 899

🖤😏


View Profile
August 17, 2023, 07:03:31 PM
 #3222

hi members!

I have a multibit classic wallet that currently holds 17BTC
Somewhere in 2014/2015 i lost my wallet password.

Many attempts have been tried to bruteforce the wallet password, without any success.
KeychainX, dave bitcoin, everyone already tried to guess or break my password.


Would you asume there is a possibility to use software to try and recover my wallet using the Pollard approach?
Can someone point me in the right direction on what sofware and settings i should be using?

I still have access to the Multibit wallet, only the password is missing.
I have my wallet address and it's public key.
Maybe this could come in handy to extract certain transaction data?

Thank you
In here we are aliens with passwords, we only  work with public keys, you could post it here so we could check it out ( not making any difference, because we are stuck with keys smaller than 160 bit ).

Have you tried hashcat yet?
Regarding pollard's method aka kangaroo, you could divide your public key by 2 but before that either add 1G or subtract 1G then you'll have 2 public keys, original and it's +1, you could divide them both by 2 four times in a row, then add 1G to each result and divide all of them by 2, at the end you will have millions of keys, which would be impossible to do the division and addition manually you'd need a program to do that which doesn't exist, but if you could do that then for example you could divide n of secpk1 by 2 as many times as you divided your public key and input those millions/ billions of offsets into kangaroo and then use n/2, n/4, n/8 etc as your start range, you could subtract an estimated number from your n/2 and use it as start and add that estimated number to n/2 and use it as end range, I'd imagine you'll have to try at least 200 start/end ranges one by one and spend at least 6 hours for each search.

Wish you find your coins, good luck.

🖤😏
james5000
Jr. Member
*
Offline Offline

Activity: 69
Merit: 2


View Profile
August 17, 2023, 07:05:31 PM
 #3223

Speaking of spamming the topic with unimportant content!

When you guys realize that in order to find a key based on address alone, first you'd need to break rmd160, then sha256 to get the public key and then find the private key based on the public key, since only public key and private key are directly related mathematically.

What you should do instead now that you are using your time, you should find any relation between similar addresses and their public/ private keys with  their sha256 hashes, at least this way you are one step closer to solving 66 etc, because you won't have to face rmd160.

However, trying to do that will require more power and time than solving the puzzle #160.

So don't waste your time on something that difficult, try finding ways to go around the EC rules and break/ bend them either completely or partially.


For example, this is a method to partially break EC :

Divide a point by e.g, 5, then divide n by 5, and then add the result of p/5 to n/5, if your point is not divisible by 5 depending on the last digit of the private key, the division result differs.

Demonstration :
823 / 5 = 164.6
Now all you need is to extract 0.6 of n in secp256k1 and keep it for next operation, then after dividing 823 by 5, you just divide n by 5 and add the result of 823/5 to n/5 + 6/10 of n = 164

But what happens if we divide 822 / 5 = 164.4, just follow the previous steps this time extract 4/10 of n to add to your second result.

We just broke EC by simple math operations, though when your key is large and unknown, the fraction could be any percentage of n, but if you divide by 2 up to 9, since any key can only have 0 up to 9 on it's last digit, 1 out of 10 division + n/th + n/remainder will work.



I could never find these things out if I was still working on addresses and hashes.😉




Quote
what I need to know is, how to get the checkpoints for the puzzle 130 and how many checkpoints do i need their x coordinates in the checkpoints? Also will the code print the target public key's equivalent private key or will it save it to a file? Thanks as we all learning...

You can use key subtracter by alberto, https://bitcointalk.org/index.php?topic=5360656.0

You could use a known public key and use -a - s with -r 0:f  -n 30 to have 15 + and -15 of your known public key, however use -z and -x to have only x coordinates, then you can convert them all to decimal.

Simply the best idea I've seen in days, truly ingenious. I will run some tests and check some calculations, thank you very much!!  Cheesy Grin
bestie1549
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
August 17, 2023, 07:07:12 PM
 #3224

Pollard Kangaroo approach is for the know private key range and for the best, within 125 bit range and of course since you have the Multibit wallet handy all you have to do is "Once you located the files, if you have access to an old multibit app on you computer you need to import the wallet and export the private keys to a new wallet. If you do not have a copy of Multibit, you can use OpenSSL together with your password to decrypt the files and recover the keys."

You need the password to export them. I still have the wallet open every single day since then.
I just keep looking at what value I've missed out on Smiley

The difference between your case and the puzzle is that we can't know the specific bit range just by looking at the public key and transactions from your pubkeys can't tell us what range the private key would be or else all of Satoshi wallets with exposed pubkeys would have been emptied by now. The best we would need to do is scan from first bit all the way to the end of the 256 bit range which of course would be like trying to scan for the wallets of Satoshi with the 50 bitcoins from the early mining... wouldn't pay off stilleven if you are able to scan for 1 wallet successfully, you'd need funds from 10 of those wallets to scan for just 1
tarmi
Legendary
*
Offline Offline

Activity: 1218
Merit: 1010


View Profile
August 17, 2023, 07:17:07 PM
 #3225


Have you tried hashcat yet?

Wish you find your coins, good luck.

I've spent close to 250k since 2014 on this, so, yes.
Bruteforcing is no option.

Dave succesfully recovered a wallet holding +- 1800BTC around the same time (lost all passwords the same day), so i know he's a capable guy.
If he tells me after almost ten years it's impossible using the bruteforce technique, then i trust him.

I guess i'll wait it out until our technology evolves.
bestie1549
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
August 17, 2023, 07:38:15 PM
 #3226


Have you tried hashcat yet?

Wish you find your coins, good luck.

I've spent close to 250k since 2014 on this, so, yes.
Bruteforcing is no option.

Dave succesfully recovered a wallet holding +- 1800BTC around the same time (lost all passwords the same day), so i know he's a capable guy.
If he tells me after almost ten years it's impossible using the bruteforce technique, then i trust him.

I guess i'll wait it out until our technology evolves.
So who's this mighty Dave Guy?
I guess he must be very conversant with the password utils more than the private keys utils that we are handy with. But we will definitely say you should never let your gourd down because you still have hopes and you could just have a dream and remember what your forgotten password was... but unlike the private key operation, you can wake up from a dream remembering all 64 hexadecimal character private key or 51/52 compressed or uncompressed format of your private key... except you wrote it down somewhere or backed it up somehow.

Best we leave this for Dave to handle and maybe someday when we have the private keys backed up with passwords for stronger security against theft when the EC curve has been defeated... maybe until then will we be able to ask for Dave's assistance but right now... 66 bits is slapping our faces mercilessly that we don't know a way to tackle it...
GoldTiger69
Hero Member
*****
Offline Offline

Activity: 582
Merit: 502


View Profile WWW
August 17, 2023, 09:31:36 PM
 #3227

Pollard Kangaroo approach is for the know private key range and for the best, within 125 bit range and of course since you have the Multibit wallet handy all you have to do is "Once you located the files, if you have access to an old multibit app on you computer you need to import the wallet and export the private keys to a new wallet. If you do not have a copy of Multibit, you can use OpenSSL together with your password to decrypt the files and recover the keys."

You need the password to export them. I still have the wallet open every single day since then.
I just keep looking at what value i've missed out on Smiley

I'm confused, do you have the wallet or you don't? How come the wallet is lost and you have it open?

Maybe I'm missing something here?

I can help you to restore/recover your wallet or password.
https://bitcointalk.org/index.php?topic=1234619.0
digaran
Copper Member
Hero Member
*****
Offline Offline

Activity: 1330
Merit: 899

🖤😏


View Profile
August 17, 2023, 09:48:29 PM
 #3228


Have you tried hashcat yet?

Wish you find your coins, good luck.

I've spent close to 250k since 2014 on this, so, yes.
Bruteforcing is no option.

Dave succesfully recovered a wallet holding +- 1800BTC around the same time (lost all passwords the same day), so i know he's a capable guy.
If he tells me after almost ten years it's impossible using the bruteforce technique, then i trust him.

I guess i'll wait it out until our technology evolves.
Well, what I described has nothing to do with brute force, it's also not related to technology, it's a rather simple math equation.

I have heard and read about Dave's work, seems legit and secure to give him wallet hash, best way to crack a wallet's password without giving him access to the wallet if he can crack it.

But password recovery and elliptic curve operations are different, however a 256 bit key is not possible to solve currently.

Just a friendly advice, never spend money on recovery before calculating everything scientifically, always ask experts for precise calculations of success, time, odds, probability etc.😉

🖤😏
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
August 18, 2023, 12:35:41 AM
 #3229

I have experience working with multibit wallets. Maybe I can help.

The wallet itself is lost. Dave Bitcoin has been working on it since early 2014, bruteforce of the entire range up to 10 characters has been attempted.
At one point, KeychainX found a false positive using the words i gave him, but it was just that - a false positive.

My only remaining options at this point are to handle this like solving the puzzles, but with my own wallet  Undecided



Pollard Kangaroo approach is for the know private key range and for the best, within 125 bit range and of course since you have the Multibit wallet handy all you have to do is "Once you located the files, if you have access to an old multibit app on you computer you need to import the wallet and export the private keys to a new wallet. If you do not have a copy of Multibit, you can use OpenSSL together with your password to decrypt the files and recover the keys."

You need the password to export them. I still have the wallet open every single day since then.
I just keep looking at what value i've missed out on Smiley
If you have the .key or .wallet file, your best option is brute force, if they haven't been able to help you with brute force 10 characters? (or that's what I understood), it's simple, programmer error.
maybe it's an encryption problem, some software have had problems logging in when updates are applied, or special characters that are interpreted differently.

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
August 18, 2023, 02:21:01 AM
 #3230

hi members!

I have a multibit classic wallet that currently holds 17BTC
Somewhere in 2014/2015 i lost my wallet password.

Many attempts have been tried to bruteforce the wallet password, without any success.
KeychainX, dave bitcoin, everyone already tried to guess or break my password.


Would you asume there is a possibility to use software to try and recover my wallet using the Pollard approach?
Can someone point me in the right direction on what sofware and settings i should be using?

I still have access to the Multibit wallet, only the password is missing.
I have my wallet address and it's public key.
Maybe this could come in handy to extract certain transaction data?

Thank you
What I would do in your case is find out what version of multibit you had when you created the wallet, the type of encryption that the software used at that time and inquire about a bug on that date, the language of your computer keyboard, maybe you used an unusual character that those who tried to help you with brute force did not enter, there may be a character in your password that is not included in their tools, a simple space key, or any other, as well as the type of format of plain text of the file, salt, etc...
In short, I would make a code replicating the source environment to avoid errors in brute force.

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
digaran
Copper Member
Hero Member
*****
Offline Offline

Activity: 1330
Merit: 899

🖤😏


View Profile
August 18, 2023, 06:19:48 AM
 #3231


Code:
from sympy import mod_inverse
import secp256k1 as ice
pub=ice.pub2upub('0433709eb11e0d4439a729f21c2c443dedb727528229713f0065721ba8fa46f00e2a1c304a39a77775d3579d077b6ee5e4d26fd3ec36f52ad674a9b47fdd999c48')
N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141

k=mod_inverse(2,N)
neg1=ice.point_negation(ice.scalar_multiplication(1))


def ters(Qx,Scalar):
     ScalarBin = str(bin(Scalar))[2:]
     le=len(ScalarBin)
     for i in range (1,le+1):
        if ScalarBin[le-i] == "0":
            Qx=ice.point_multiplication(k,Qx)
        else:
            Qx=ice.point_addition(Qx,neg1)
            Qx=ice.point_multiplication(k,Qx)
     return ice.point_to_cpub(Qx)


for x in range(1,65536):
         print(ters(pub,x))
Hey man, I wanted to try your script but error is  sympy module not found or doesn't exist. Any other way to get mod inverse working?

🖤😏
tarmi
Legendary
*
Offline Offline

Activity: 1218
Merit: 1010


View Profile
August 18, 2023, 06:23:57 AM
 #3232

Pollard Kangaroo approach is for the know private key range and for the best, within 125 bit range and of course since you have the Multibit wallet handy all you have to do is "Once you located the files, if you have access to an old multibit app on you computer you need to import the wallet and export the private keys to a new wallet. If you do not have a copy of Multibit, you can use OpenSSL together with your password to decrypt the files and recover the keys."

You need the password to export them. I still have the wallet open every single day since then.
I just keep looking at what value i've missed out on Smiley

I'm confused, do you have the wallet or you don't? How come the wallet is lost and you have it open?

Maybe I'm missing something here?

All info can be found on github here

https://github.com/gurnec/btcrecover/issues/212

I've also posted the hash if anyone wants to take a shot at it, i offer a 5BTC reward.

Tepan
Jr. Member
*
Offline Offline

Activity: 38
Merit: 1


View Profile
August 18, 2023, 07:29:28 AM
 #3233

Just info.

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9aFJuCJDo5F6Jm7 # 40
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9gCD9CBomewdcUD # 41
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9zzYEemjCVJ3vo9 # 42
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdB23bP5LsYN8Krv7 # 43
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdCpdGyxm7PWoNQdr # 44
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdDrgx63tbte4scLA # 45
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdLwb42sQhwTBJDnG # 46
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdcLTenJYVVVTRzxN # 47
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdtUGWxHzvDi28MfR # 48
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgejcjwprJ4MAYLw8e # 49
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgfXBMYdNVA4EjUMzg # 50
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgm9fa43QnU2CpULaK # 51
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjguYJTZsntce5oQQrh # 52
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjh5SmqrUoK2mhwSYFV # 53
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjhHvuTMSDchRp5hktc # 54
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjidyYKE5NcJQZYvknA # 55
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjjb65nDHeqyjiBaJXv # 56
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjqtiAvYTJzYEmqup7b # 57
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjv2kTamEYQT9BNC7o1 # 58
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkHpsTBP19HvTFqiU6i # 59
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkzijLsc5qE43yZ5eLV # 60
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YmLDHsih379uP9zbHSD # 61
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YpCemuaUp7NigjvtJug # 62
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yv5Z9J7hv7VYYN3XL3Y # 63
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Z6FxoaD5r1kYegmtbaT # 64
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q ZM21gaY8WN2CdwnTG57 # 65
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 66
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 67
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 68
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 69
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q t5RQNhFCn1r58in2E78 # 70
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 71
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 72
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 73
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 74
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3y HuxB7NfERRuDTNy2kbr # 75
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 76
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 77
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 78
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 79
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi APRB6KvN7FnKsw69PP7vW # 80
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 81
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 82
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 83
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 84
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ kCnRjpBspr8M5K8YnUtDNa # 85
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 86
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 87
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 88
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 89
KwDiBf89QgGbjEhKnhXJuH7LrciVr bEiEhLWVU4Yn1RCfnX51KrT # 90
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 91
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 92
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 93
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 94
KwDiBf89QgGbjEhKnhXJuH7LrciV sLfMYB8ydZ3QXMqEra1sapfT # 95
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 96
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 97
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 98
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 99
KwDiBf89QgGbjEhKnhXJuH7Lrci WJvjTPYdp4sSLwstc63avmfRA # 100
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 101
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 102
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 103
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 104
KwDiBf89QgGbjEhKnhXJuH7Lrci m5eBMkFQwQtRbW6wxT1ajoNqE # 105
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 106
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 107
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 108
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 109
KwDiBf89QgGbjEhKnhXJuH7Lrc tLcZtumiizzSmSckgpxQu6ieu6 # 110
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 111
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 112
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 113
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 114
KwDiBf89QgGbjEhKnhXJuH7Lr hcVkatbczm7Y9ZaB56U1jLNU2Xh # 115
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 116
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 117
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 118
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 119


Think in your own way and your own point of view about this WIF range
DegenHero
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
August 18, 2023, 08:04:38 AM
 #3234

Just info.

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9aFJuCJDo5F6Jm7 # 40
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9gCD9CBomewdcUD # 41
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9zzYEemjCVJ3vo9 # 42
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdB23bP5LsYN8Krv7 # 43
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdCpdGyxm7PWoNQdr # 44
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdDrgx63tbte4scLA # 45
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdLwb42sQhwTBJDnG # 46
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdcLTenJYVVVTRzxN # 47
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdtUGWxHzvDi28MfR # 48
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgejcjwprJ4MAYLw8e # 49
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgfXBMYdNVA4EjUMzg # 50
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgm9fa43QnU2CpULaK # 51
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjguYJTZsntce5oQQrh # 52
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjh5SmqrUoK2mhwSYFV # 53
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjhHvuTMSDchRp5hktc # 54
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjidyYKE5NcJQZYvknA # 55
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjjb65nDHeqyjiBaJXv # 56
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjqtiAvYTJzYEmqup7b # 57
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjv2kTamEYQT9BNC7o1 # 58
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkHpsTBP19HvTFqiU6i # 59
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkzijLsc5qE43yZ5eLV # 60
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YmLDHsih379uP9zbHSD # 61
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YpCemuaUp7NigjvtJug # 62
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yv5Z9J7hv7VYYN3XL3Y # 63
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Z6FxoaD5r1kYegmtbaT # 64
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q ZM21gaY8WN2CdwnTG57 # 65
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 66
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 67
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 68
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 69
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q t5RQNhFCn1r58in2E78 # 70
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 71
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 72
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 73
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 74
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3y HuxB7NfERRuDTNy2kbr # 75
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 76
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 77
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 78
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 79
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi APRB6KvN7FnKsw69PP7vW # 80
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 81
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 82
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 83
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 84
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ kCnRjpBspr8M5K8YnUtDNa # 85
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 86
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 87
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 88
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 89
KwDiBf89QgGbjEhKnhXJuH7LrciVr bEiEhLWVU4Yn1RCfnX51KrT # 90
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 91
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 92
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 93
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 94
KwDiBf89QgGbjEhKnhXJuH7LrciV sLfMYB8ydZ3QXMqEra1sapfT # 95
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 96
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 97
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 98
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 99
KwDiBf89QgGbjEhKnhXJuH7Lrci WJvjTPYdp4sSLwstc63avmfRA # 100
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 101
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 102
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 103
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 104
KwDiBf89QgGbjEhKnhXJuH7Lrci m5eBMkFQwQtRbW6wxT1ajoNqE # 105
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 106
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 107
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 108
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 109
KwDiBf89QgGbjEhKnhXJuH7Lrc tLcZtumiizzSmSckgpxQu6ieu6 # 110
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 111
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 112
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 113
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 114
KwDiBf89QgGbjEhKnhXJuH7Lr hcVkatbczm7Y9ZaB56U1jLNU2Xh # 115
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 116
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 117
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 118
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 119


Think in your own way and your own point of view about this WIF range

What is this, @Tepan?
vneos
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
August 18, 2023, 08:30:25 AM
 #3235

Is there anyone here who owns or can rent h100 gpu? I would like to know the performance of tools such as Bitcrack on this GPU.
SamReomo
Hero Member
*****
Offline Offline

Activity: 798
Merit: 673


Top Crypto Casino


View Profile
August 18, 2023, 08:54:14 AM
 #3236

Is there anyone here who owns or can rent h100 gpu? I would like to know the performance of tools such as Bitcrack on this GPU.

I don't think that anyone would be willing to rent that GPU for you because I have searched it on a site and the rent of that GPU is around $1.99/hr which is very high for most people. If you really want to test the performance on Bitcrack on that GPU then you'll have to rent it out yourself.

Here is the link of the site that's offering renting of that GPU:
lambdalabs link

I must confirm you that I'm in no way affiliated with that site, I simply made a Google search and found that site. I would also recommend you to research about the legitimacy of the site your self before paying for GPU's rent. I would not be responsible for any damages or losses that occurs if you purchase plans on that site.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
vneos
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
August 18, 2023, 09:04:36 AM
 #3237

Is there anyone here who owns or can rent h100 gpu? I would like to know the performance of tools such as Bitcrack on this GPU.

I don't think that anyone would be willing to rent that GPU for you because I have searched it on a site and the rent of that GPU is around $1.99/hr which is very high for most people. If you really want to test the performance on Bitcrack on that GPU then you'll have to rent it out yourself.

Here is the link of the site that's offering renting of that GPU:
lambdalabs link

I must confirm you that I'm in no way affiliated with that site, I simply made a Google search and found that site. I would also recommend you to research about the legitimacy of the site your self before paying for GPU's rent. I would not be responsible for any damages or losses that occurs if you purchase plans on that site.

I have tried renting h100 on this website before, but it shows h100 are out of capacity.

So I want to ask if anyone has tried hunting on the h100, and if so, could you share the specific speed?
bestie1549
Jr. Member
*
Offline Offline

Activity: 75
Merit: 5


View Profile
August 18, 2023, 11:34:25 AM
 #3238

Just info.

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9aFJuCJDo5F6Jm7 # 40
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9gCD9CBomewdcUD # 41
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9zzYEemjCVJ3vo9 # 42
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdB23bP5LsYN8Krv7 # 43
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdCpdGyxm7PWoNQdr # 44
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdDrgx63tbte4scLA # 45
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdLwb42sQhwTBJDnG # 46
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdcLTenJYVVVTRzxN # 47
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdtUGWxHzvDi28MfR # 48
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgejcjwprJ4MAYLw8e # 49
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgfXBMYdNVA4EjUMzg # 50
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgm9fa43QnU2CpULaK # 51
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjguYJTZsntce5oQQrh # 52
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjh5SmqrUoK2mhwSYFV # 53
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjhHvuTMSDchRp5hktc # 54
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjidyYKE5NcJQZYvknA # 55
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjjb65nDHeqyjiBaJXv # 56
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjqtiAvYTJzYEmqup7b # 57
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjv2kTamEYQT9BNC7o1 # 58
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkHpsTBP19HvTFqiU6i # 59
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkzijLsc5qE43yZ5eLV # 60
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YmLDHsih379uP9zbHSD # 61
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YpCemuaUp7NigjvtJug # 62
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yv5Z9J7hv7VYYN3XL3Y # 63
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Z6FxoaD5r1kYegmtbaT # 64
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q ZM21gaY8WN2CdwnTG57 # 65
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 66
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 67
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 68
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 69
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q t5RQNhFCn1r58in2E78 # 70
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 71
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 72
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 73
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 74
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3y HuxB7NfERRuDTNy2kbr # 75
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 76
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 77
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 78
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 79
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi APRB6KvN7FnKsw69PP7vW # 80
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 81
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 82
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 83
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 84
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ kCnRjpBspr8M5K8YnUtDNa # 85
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 86
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 87
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 88
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 89
KwDiBf89QgGbjEhKnhXJuH7LrciVr bEiEhLWVU4Yn1RCfnX51KrT # 90
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 91
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 92
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 93
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 94
KwDiBf89QgGbjEhKnhXJuH7LrciV sLfMYB8ydZ3QXMqEra1sapfT # 95
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 96
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 97
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 98
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 99
KwDiBf89QgGbjEhKnhXJuH7Lrci WJvjTPYdp4sSLwstc63avmfRA # 100
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 101
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 102
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 103
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 104
KwDiBf89QgGbjEhKnhXJuH7Lrci m5eBMkFQwQtRbW6wxT1ajoNqE # 105
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 106
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 107
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 108
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 109
KwDiBf89QgGbjEhKnhXJuH7Lrc tLcZtumiizzSmSckgpxQu6ieu6 # 110
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 111
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 112
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 113
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 114
KwDiBf89QgGbjEhKnhXJuH7Lr hcVkatbczm7Y9ZaB56U1jLNU2Xh # 115
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 116
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 117
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 118
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 119


Think in your own way and your own point of view about this WIF range

Do we have GPU crackers for WIF Private Keys? or do we have someone that can build 1? these have more potentials for brute forcing puzzle 66 from the Random Point of view for probably the last 16 - 18 characters ranges scanned sequentially, compared to the hexadecimal private keys because of the checksum involved in the WIF Private keys... this might be it, every hexadecimal key is valid but not all WIFs are which brings us to the point where scanning might be fun to play with
mcdouglasx
Member
**
Offline Offline

Activity: 237
Merit: 53

New ideas will be criticized and then admired.


View Profile WWW
August 18, 2023, 11:40:22 AM
 #3239


Code:
from sympy import mod_inverse
import secp256k1 as ice
pub=ice.pub2upub('0433709eb11e0d4439a729f21c2c443dedb727528229713f0065721ba8fa46f00e2a1c304a39a77775d3579d077b6ee5e4d26fd3ec36f52ad674a9b47fdd999c48')
N=0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141

k=mod_inverse(2,N)
neg1=ice.point_negation(ice.scalar_multiplication(1))


def ters(Qx,Scalar):
     ScalarBin = str(bin(Scalar))[2:]
     le=len(ScalarBin)
     for i in range (1,le+1):
        if ScalarBin[le-i] == "0":
            Qx=ice.point_multiplication(k,Qx)
        else:
            Qx=ice.point_addition(Qx,neg1)
            Qx=ice.point_multiplication(k,Qx)
     return ice.point_to_cpub(Qx)


for x in range(1,65536):
         print(ters(pub,x))
Hey man, I wanted to try your script but error is  sympy module not found or doesn't exist. Any other way to get mod inverse working?

To install the `sympy` module on Windows, type CMD in the search bar and open Command Prompt and type
 pip install mpmath, first and then pip install sympy.
put ice dll and secp256k1.py in the same folder where you have the script.

I'm not dead, long story... BTC bc1qxs47ttydl8tmdv8vtygp7dy76lvayz3r6rdahu
gacel
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
August 18, 2023, 12:00:04 PM
 #3240

Just info.

KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9aFJuCJDo5F6Jm7 # 40
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9gCD9CBomewdcUD # 41
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgd9zzYEemjCVJ3vo9 # 42
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdB23bP5LsYN8Krv7 # 43
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdCpdGyxm7PWoNQdr # 44
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdDrgx63tbte4scLA # 45
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdLwb42sQhwTBJDnG # 46
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdcLTenJYVVVTRzxN # 47
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgdtUGWxHzvDi28MfR # 48
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgejcjwprJ4MAYLw8e # 49
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjgfXBMYdNVA4EjUMzg # 50
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjgm9fa43QnU2CpULaK # 51
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjguYJTZsntce5oQQrh # 52
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjh5SmqrUoK2mhwSYFV # 53
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjhHvuTMSDchRp5hktc # 54
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjidyYKE5NcJQZYvknA # 55
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjjb65nDHeqyjiBaJXv # 56
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YjqtiAvYTJzYEmqup7b # 57
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yjv2kTamEYQT9BNC7o1 # 58
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkHpsTBP19HvTFqiU6i # 59
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YkzijLsc5qE43yZ5eLV # 60
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YmLDHsih379uP9zbHSD # 61
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q YpCemuaUp7NigjvtJug # 62
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Yv5Z9J7hv7VYYN3XL3Y # 63
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q Z6FxoaD5r1kYegmtbaT # 64
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q ZM21gaY8WN2CdwnTG57 # 65
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 66
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 67
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 68
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 69
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q t5RQNhFCn1r58in2E78 # 70
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 71
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 72
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 73
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                   # 74
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3y HuxB7NfERRuDTNy2kbr # 75
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 76
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 77
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 78
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3q                  # 79
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi APRB6KvN7FnKsw69PP7vW # 80
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 81
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 82
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 83
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi                  # 84
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ kCnRjpBspr8M5K8YnUtDNa # 85
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 86
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 87
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 88
KwDiBf89QgGbjEhKnhXJuH7LrciVrZ                     # 89
KwDiBf89QgGbjEhKnhXJuH7LrciVr bEiEhLWVU4Yn1RCfnX51KrT # 90
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 91
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 92
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 93
KwDiBf89QgGbjEhKnhXJuH7LrciVr                    # 94
KwDiBf89QgGbjEhKnhXJuH7LrciV sLfMYB8ydZ3QXMqEra1sapfT # 95
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 96
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 97
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 98
KwDiBf89QgGbjEhKnhXJuH7LrciV                     # 99
KwDiBf89QgGbjEhKnhXJuH7Lrci WJvjTPYdp4sSLwstc63avmfRA # 100
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 101
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 102
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 103
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 104
KwDiBf89QgGbjEhKnhXJuH7Lrci m5eBMkFQwQtRbW6wxT1ajoNqE # 105
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 106
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 107
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 108
KwDiBf89QgGbjEhKnhXJuH7Lrci                     # 109
KwDiBf89QgGbjEhKnhXJuH7Lrc tLcZtumiizzSmSckgpxQu6ieu6 # 110
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 111
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 112
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 113
KwDiBf89QgGbjEhKnhXJuH7Lrc                       # 114
KwDiBf89QgGbjEhKnhXJuH7Lr hcVkatbczm7Y9ZaB56U1jLNU2Xh # 115
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 116
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 117
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 118
KwDiBf89QgGbjEhKnhXJuH7Lr                        # 119


Think in your own way and your own point of view about this WIF range

Do we have GPU crackers for WIF Private Keys? or do we have someone that can build 1? these have more potentials for brute forcing puzzle 66 from the Random Point of view for probably the last 16 - 18 characters ranges scanned sequentially, compared to the hexadecimal private keys because of the checksum involved in the WIF Private keys... this might be it, every hexadecimal key is valid but not all WIFs are which brings us to the point where scanning might be fun to play with

What is the point of this if what you see in every row is just representation of padded zeros?
Pages: « 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 [162] 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 ... 250 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!