Bitcoin Forum
March 12, 2026, 11:12:31 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 [355] 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 ... 639 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 373113 times)
bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
January 12, 2025, 09:32:42 PM
 #7081


Beware of scammers, he is trying to get my 1BY8GQbnueY prefix addresses from me but doesn't have any himself and wants to offer me his 1BY8GQbnue addresses in return.
Not trustworthy

Why did you clear your Telegram conversations? Smiley

https://ibb.co/1Z3CGSr

Can you please explain why you asked me for a list and to clear your telegram conversations?

A scammer and unreliable person. He said he was an adult. Smiley I'm laughing right now. (From anger.)


The list he sent me, even though I didn't want it. I hope it helps someone.

https://privatebin.net/?0a1481abe78a7624#HkQXcLiuWmzR8oL4t9U7iqkovRNtNko96umTrj8GjP7E

@Th3_Li - Telegram Name

He keeps deleting the telegram chat so that I can show him the evidence. Smiley
cctv5go
Newbie
*
Offline Offline

Activity: 50
Merit: 0


View Profile
January 13, 2025, 02:05:46 AM
 #7082

I have more than ten prefixes 1BY8GQbnueYo
But unfortunately, I didn't receive the bonus.
bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
January 13, 2025, 02:13:12 AM
 #7083

I have more than ten prefixes 1BY8GQbnueYo
But unfortunately, I didn't receive the bonus.

I think you are talking about this wallet

1BY8GQbnueYorheQWy3zBrn72BS1UEdfDB

6xx is that correct?
hoanghuy2912
Newbie
*
Offline Offline

Activity: 60
Merit: 0


View Profile
January 13, 2025, 04:35:43 AM
 #7084

According to the clues I have, the private key is definitely only at 6ffffffffffffffff:7ffffffffffffffff
bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
January 13, 2025, 11:57:12 AM
 #7085

Hello everyone,

I wish everyone success in their work.

I said something in my previous messages.
"Every brave man eats yogurt differently."

I have met many people here and I also have private meetings.

I have never had a bad thought about anyone. For this reason, I do not LIE to anyone.

I have something to say to those who try to deceive me.
"Do you really think these things with such intelligence?"

What you want is just MONEY Smiley
What I want is bigger, your intelligence is not enough for it.

I do not want anything from anyone. I have previously told those who sent the prefix, "When I find the 67th wallet, I will send their gifts." for helping with the calculations.

Note: Valid for those between 6A... and 7D... I am not interested in other ranges. Valid only for the prefix 1BY8GQbnue or 1BY8GQbnueY.

I wish everyone good luck and good work.
pbies
Full Member
***
Offline Offline

Activity: 413
Merit: 230



View Profile
January 14, 2025, 05:24:35 PM
 #7086

to waste time.
simple python code for puzzle 66.
it is extremely slow but to learn what we are looking for..

Code:
import hashlib
import time
import base58
import threading
import keyboard  # For detecting key press events
from bitcoinlib.keys import Key

print("Starting scan, hit x to exit...")

# Function to check if the private key corresponds to the Bitcoin address
def check_private_key_for_address(private_key_hex, expected_address):
    # Convert the private key hex to WIF format (compressed)
    wif_private_key = hex_to_wif(private_key_hex, compressed=True)
    
    # Create a Key object from the WIF private key
    key = Key.from_wif(wif_private_key)
    
    # Generate the compressed Bitcoin address from the private key (P2PKH)
    generated_address = key.address('p2pkh')
    
    # Compare the generated address with the expected address
    if generated_address == expected_address:
        return private_key_hex, generated_address
    return None

# Function to convert a hex private key to WIF (compressed)
def hex_to_wif(private_key_hex, compressed=True):
    # Convert hex to bytes
    private_key_bytes = bytes.fromhex(private_key_hex)
    
    # WIF requires the mainnet prefix 0x80 for a mainnet key
    version_byte = b'\x80'
    extended_key = version_byte + private_key_bytes
    
    # Add 0x01 byte at the end if compressed
    if compressed:
        extended_key += b'\x01'
    
    # Create checksum for WIF format
    checksum = hashlib.sha256(hashlib.sha256(extended_key).digest()).digest()[:4]
    
    # Convert to base58 and return the WIF format
    wif = base58.b58encode(extended_key + checksum).decode('utf-8')
    
    return wif

# Function to listen for the 'X' key press in a separate thread
def listen_for_stop():
    global stop_flag
    while True:
        if keyboard.is_pressed('x'):  # When 'x' is pressed
            print("Stopping search...")
            stop_flag = True
            break

# Function to process a range of keys in a separate thread
def process_key_range(start_value, end_value, expected_address, file):
    global stop_flag, match_found
    total_keys = 0
    start_time = time.time()
    
    for value in range(start_value, end_value + 1):
        if stop_flag or match_found:  # Check if the search should be stopped
            return
        
        private_key_hex = hex(value)[2:].zfill(64)  # Convert to hex and pad to 64 characters
        result = check_private_key_for_address(private_key_hex, expected_address)
        
        if result:
            private_key_hex, expected_address = result
            print(f"MATCH!")
            print(f"private_key_hex: {private_key_hex}")
            print(f"expected_address: {expected_address}")
            
            # Write the match to 'found.txt'
            with open('found.txt', 'a') as file:
                file.write(f"MATCH!\nprivate_key_hex: {private_key_hex}\nexpected_address: {expected_address}\n\n")
            
            match_found = True  # Mark match found
            stop_flag = True  # Stop all other threads
            return
        
        total_keys += 1
        
        # Every 30 seconds, print speed (keys/sec)
        if time.time() - start_time >= 30:
            elapsed_time = time.time() - start_time
            speed = total_keys / elapsed_time  # Keys per second
            print(f"Speed: {speed:.2f} keys/sec")
            start_time = time.time()  # Reset the timer
            total_keys = 0  # Reset the count of keys processed in the last 30 seconds

# Expected address to match
expected_address = "13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so"  # Compressed address

# Range of private keys to search
start_value = 0x2832ed74f2b5c0000
end_value = 0x5ffffffffffffffff

# Global flags
stop_flag = False
match_found = False  # Flag to indicate if a match is found

# Start the listener for key press in a separate thread
listener_thread = threading.Thread(target=listen_for_stop)
listener_thread.daemon = True
listener_thread.start()

# Open the 'found.txt' file in append mode to store matched results
with open('found.txt', 'a') as file:
    threads = []
    num_threads = 1  # Adjust the number of threads as necessary
    range_size = (end_value - start_value + 1) // num_threads
    
    # Divide the range into multiple chunks and assign each chunk to a thread
    for i in range(num_threads):
        thread_start = start_value + i * range_size
        thread_end = start_value + (i + 1) * range_size - 1
        if i == num_threads - 1:  # Ensure the last thread processes the remaining range
            thread_end = end_value
        
        # Start the thread for the given range
        thread = threading.Thread(target=process_key_range, args=(thread_start, thread_end, expected_address, file))
        threads.append(thread)
        thread.start()

    # Wait for all threads to finish or for a match to be found
    for thread in threads:
        thread.join()

    if match_found:
        print("Match found! Exiting.")
    elif stop_flag:
        print("Search stopped by user.")
    else:
        print("Private key does not match the address in the given range.")

Really?

222 keys per second with 16 threads?

Are you kidding me?

BTC: bc1qmrexlspd24kevspp42uvjg7sjwm8xcf9w86h5k
dibzzy
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
January 15, 2025, 12:12:38 AM
 #7087


Quote

its only for to show and learn how the process is done using one thread.
feel free to optimize but its impossible to gain speed with python.
using opencl makes no difference.
that is why to use C..


here's a simple one i made in python .. does about 35-50k keys/s deppending on cpu https://github.com/dibzzy/Easy-Bitcoin-puzzle-key-scanner
iceland2k14
Member
**
Offline Offline

Activity: 76
Merit: 89


View Profile
January 15, 2025, 05:39:35 AM
 #7088

I still don't understand why people are searching for the Prefix 1BY8GQbnue . It does not give any advantage towards the full solution, no matter what anyone believes.
Kelvin555
Jr. Member
*
Offline Offline

Activity: 63
Merit: 1


View Profile
January 15, 2025, 10:18:09 AM
 #7089

I still don't understand why people are searching for the Prefix 1BY8GQbnue . It does not give any advantage towards the full solution, no matter what anyone believes.

It gives an advantage towards the full solution for some other people but not in the way the people searching for the prefixes think.
saatoshi_falling
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
January 15, 2025, 12:38:13 PM
 #7090

I would not have thought the year 2025 would be the war of the prefixes.
You guys really need to understand this. You literally change 1 character and the prefix has no use. 1BY8GQbnuXX can be at the start of the range, while 1BY8GQbnuXXY can be at the very end of the range. There's no link. You can't reverse it. I'm having a hard time to even express this because it's such a stupid idea.
I won't be contributing to this thread until Bitcoin leaves the 100k quack range and reaches 59k what I call the "sanity range" where more normal theories are being discussed.
Jorge54PT
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
January 15, 2025, 04:09:04 PM
 #7091

Everyone comments on everyone's methods, but what I know is that 67 is still intact Smiley
mcdouglasx
Hero Member
*****
Offline Offline

Activity: 938
Merit: 522



View Profile WWW
January 15, 2025, 04:28:49 PM
 #7092

I would not have thought the year 2025 would be the war of the prefixes.
You guys really need to understand this. You literally change 1 character and the prefix has no use. 1BY8GQbnuXX can be at the start of the range, while 1BY8GQbnuXXY can be at the very end of the range. There's no link. You can't reverse it. I'm having a hard time to even express this because it's such a stupid idea.
I won't be contributing to this thread until Bitcoin leaves the 100k quack range and reaches 59k what I call the "sanity range" where more normal theories are being discussed.

What I understand here is the following: 1. They gather a series of prefixes and catalog them to average the distances between each prefix (pattern). 2. They search by probability in the approximate ranges to the next possible pattern.
Since the puzzle is in a small range compared to 256 bits, it is not unreasonable to use predictions, although it is not precise, it has its logic.

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
NO KYC
CASINO
██████████████████████████
████████████████████████
███████████████████████
███████████████████
██████████████████████
███████████████████████
███████████████████████
██████████████████
███████████████████████
██████████████████
███████████████████████
████████████████████████
██████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
███████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
███████████████████████████
 

...PLAY NOW...
kTimesG
Full Member
***
Offline Offline

Activity: 770
Merit: 236


View Profile
January 15, 2025, 05:03:22 PM
 #7093

I would not have thought the year 2025 would be the war of the prefixes.
You guys really need to understand this. You literally change 1 character and the prefix has no use. 1BY8GQbnuXX can be at the start of the range, while 1BY8GQbnuXXY can be at the very end of the range. There's no link. You can't reverse it. I'm having a hard time to even express this because it's such a stupid idea.
I won't be contributing to this thread until Bitcoin leaves the 100k quack range and reaches 59k what I call the "sanity range" where more normal theories are being discussed.

What I understand here is the following: 1. They gather a series of prefixes and catalog them to average the distances between each prefix (pattern). 2. They search by probability in the approximate ranges to the next possible pattern.
Since the puzzle is in a small range compared to 256 bits, it is not unreasonable to use predictions, although it is not precise, it has its logic.

Yeah, this is why the thread has become the daily journal of "prefix of the day". The guy who started this daily blog was first under the impression that there are only 4 prefixes of some kind, and he then was proven wrong (correct value was somewhere around 1000 prefixes). And now we're all anxiously watching his catalog progress, one prefix at a time, for years to come.

I would laugh so hard to know that the real answer to 67 is just a few keys away from an already found prefix, in a range that was definitely dismissed because someone thinks he can outsmart a random noise distribution.

Off the grid, training pigeons to broadcast signed messages.
bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
January 15, 2025, 07:01:23 PM
 #7094


Yeah, this is why the thread has become the daily journal of "prefix of the day". The guy who started this daily blog was first under the impression that there are only 4 prefixes of some kind, and he then was proven wrong (correct value was somewhere around 1000 prefixes). And now we're all anxiously watching his catalog progress, one prefix at a time, for years to come.

I would laugh so hard to know that the real answer to 67 is just a few keys away from an already found prefix, in a range that was definitely dismissed because someone thinks he can outsmart a random noise distribution.

Yes, KTimesG I think you didn't understand. Your other friends may be confused.

The 4 intervals with the prefix 1BY8GQbnueY are important to me.
(Between 6A... and 7D...)

I determine the AVERAGE interval of the 1BY8GQbnue prefixes with my PROBABILITY and MATHEMATICAL calculations.

Are you saying that the 1BY8GQbnueY prefix is ​​over 1000?
Be patient a little longer, as I said when it is finished I will share the Hex code, SHA256 and SHA512.
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 15, 2025, 08:39:53 PM
 #7095

THERE ARE MULTIPLE COMBINATIONS THESE ADDRESSES EXIST WE JUST DON'T HAVE THEIR PRIVATE KEYS YET BUT THERE ARE ENDLESS COMBINATIONS... I FOUND THESE THIS MONTH

Someone send me some money to help with energy I will continue publishing but addresses thank you      my address donate       1ericoPSxFdQWGAE6iDcdc2jc3HBRYpEC

PubAddress: 1BY8GQbnu1DPVT6c66yLZRvMRcugu41i4v
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qb1BpUpTPTMZvzTW6w38
Priv (HEX): 62AD2731CC3285DB2 (67 bit)

PubAddress: 1BY8GQbnu6v7Ux8krR8URwodBWm1SawLnr
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qb1AmPhsuXNqMapR1bpb
Priv (HEX): 62A9AA2EB577A9FF8 (67 bit)

PubAddress: 1BY8GQbnu8jSXMYE4o2ZfzFSv3D7fX7BGC
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qatTWrxLTZsfBbss3EQ2
Priv (HEX): 5DA0791C09C3BBAC4 (67 bit)

PubAddress: 1BY8GQbnu9Pr3u4dLhGZo2vCrQswS8fZTz
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qabYU6bF3ZDDBjJh2kNQ
Priv (HEX): 50EF4226B89DF60AA (67 bit)

PubAddress: 1BY8GQbnub1JKjz49sq9NhHUXVjujDNXFp
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qawb2V4cHnNNhpXYUVP1
Priv (HEX): 5FF9A24218EA189F4 (67 bit)

PubAddress: 1BY8GQbnucXmpBfXmSaqrYfmyE8v2dh2uA
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaccTEqzmmLtkcQBnFEz
Priv (HEX): 51BC8D6E6A141E38D (67 bit)

PubAddress: 1BY8GQbnuGbW7BppF1HchbeneV2gG1Gh7B
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qakTBCawW4YR6tnWw8UX
Priv (HEX): 579E96EC070A54893 (67 bit)

PubAddress: 1BY8GQbnugVjgeL43mD1SqXpAFU8mqSE5R
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaTR8PhQPcePBUvstdff
Priv (HEX): 4AD6304048C00378A (67 bit)

PubAddress: 1BY8GQbnujgvke9PYWMpNbwTs9Jdvv7KTe
Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaZ5BRtJYKA7J2VEVaaa
Priv (HEX): 4F14B15F5AE4EF20A (67 bit)PubAddress: 1BY8GQbnuy3wbCC9Gorrhi6PijfdRjtQXT

Priv (WIF): p2pkh: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qai7oV99TmLWDasNfzvh
Priv (HEX): 55DE3B4E1A5DEFA73 (67 bit)



1BY8GQbnueY1 xxxxxx
1BY8GQbnueY2 xxxxxx
1BY8GQbnueY3 xxxxxx
1BY8GQbnueY4 xxxxxx
1BY8GQbnueY5 xxxxxx
1BY8GQbnueY6 xxxxxx
1BY8GQbnueY7 xxxxxx
1BY8GQbnueY8 xxxxxx
1BY8GQbnueY9 xxxxxx
1BY8GQbnueY0 xxxxxx

1BY8GQbnueY1A xxxxx
1BY8GQbnueY1a xxxxx

1BY8GQbnueY1B xxxxx
1BY8GQbnueY1b xxxxx

1BY8GQbnueYC xxxx
1BY8GQbnueY1c xxxx  


1BY8GQbnueA
1BY8GQbnuea

1BY8GQbnueB
1BY8GQbnueb

1BY8GQbnueC
1BY8GQbnuec

1BY8GQbnueD
1BY8GQbnued

1BY8GQbnueE
1BY8GQbnuee

1BY8GQbnueF
1BY8GQbnuef

1BY8GQbnueG
1BY8GQbnueg

1BY8GQbnueH
1BY8GQbnueh

1BY8GQbnueI
1BY8GQbnuei

1BY8GQbnueJ
1BY8GQbnuej

1BY8GQbnueK
1BY8GQbnuek

1BY8GQbnueL
1BY8GQbnuel

1BY8GQbnueM
1BY8GQbnuem

1BY8GQbnueN
1BY8GQbnuen

1BY8GQbnueO
1BY8GQbnueo

1BY8GQbnueP
1BY8GQbnuep

1BY8GQbnueQ
1BY8GQbnueq

1BY8GQbnueR
1BY8GQbnuer

1BY8GQbnueS
1BY8GQbnues

1BY8GQbnueT
1BY8GQbnuet

1BY8GQbnueU
1BY8GQbnueu

1BY8GQbnueV
1BY8GQbnuev

1BY8GQbnueW
1BY8GQbnuew

1BY8GQbnueX
1BY8GQbnuex

1BY8GQbnueY
1BY8GQbnuey

1BY8GQbnueZ
1BY8GQbnuez


1BY8GQbnueA
1BY8GQbnuea

1BY8GQbnueB
1BY8GQbnueb

1BY8GQbnueC
1BY8GQbnuec

1BY8GQbnueD
1BY8GQbnued

1BY8GQbnueE
1BY8GQbnuee

1BY8GQbnueF
1BY8GQbnuef

1BY8GQbnueG
1BY8GQbnueg

1BY8GQbnueH
1BY8GQbnueh

1BY8GQbnueI
1BY8GQbnuei

1BY8GQbnueJ
1BY8GQbnuej

1BY8GQbnueK
1BY8GQbnuek

1BY8GQbnueL
1BY8GQbnuel

1BY8GQbnueM
1BY8GQbnuem

1BY8GQbnueN
1BY8GQbnuen

1BY8GQbnueO
1BY8GQbnueo

1BY8GQbnueP
1BY8GQbnuep

1BY8GQbnueQ
1BY8GQbnueq

1BY8GQbnueR
1BY8GQbnuer

1BY8GQbnueS
1BY8GQbnues

1BY8GQbnueT
1BY8GQbnuet

1BY8GQbnueU
1BY8GQbnueu

1BY8GQbnueV
1BY8GQbnuev

1BY8GQbnueW
1BY8GQbnuew

1BY8GQbnueX
1BY8GQbnuex

1BY8GQbnueY
1BY8GQbnuey

1BY8GQbnueZ
1BY8GQbnuez







bibilgin
Newbie
*
Offline Offline

Activity: 276
Merit: 0


View Profile
January 15, 2025, 09:13:52 PM
 #7096

THERE ARE MULTIPLE COMBINATIONS THESE ADDRESSES EXIST WE JUST DON'T HAVE THEIR PRIVATE KEYS YET BUT THERE ARE ENDLESS COMBINATIONS... I FOUND THESE THIS MONTH

This month?

I can find all of these in 1 day, even in half a day. Smiley
bitcoinpuzzles621
Newbie
*
Offline Offline

Activity: 15
Merit: 0


View Profile
January 15, 2025, 09:38:59 PM
 #7097

A long time ago, I would think that the prefixes were important too and that I could somehow use them in my code.  But eventually I just realized they dont help very much.  Its still all just a random search space and the solution could still be anywhere.  My code though is also terrible and can only find 1BY8G prefixes most days.  So you guys are far ahead of me in your progress if you believe that the longer prefixes are important.   I just am trying to say that I dont believe they are as important anymore.  I am more in agreement with the skeptics that post here recently about the prefixes instead.   
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 15, 2025, 09:42:05 PM
 #7098

bibilgin  How so, Bibilgin? I use an RTX 4060, and it goes to 1320 MH/s overclocked. Which card do you use, Bibilgin?
b0dre
Jr. Member
*
Offline Offline

Activity: 61
Merit: 1


View Profile
January 15, 2025, 09:53:06 PM
 #7099

I can find all of these in 1 day, even in half a day. Smiley

Which tools are you using?
hotmoney
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
January 15, 2025, 09:57:45 PM
Last edit: January 15, 2025, 10:14:34 PM by hotmoney
 #7100

I discovered last month the correct way to transfer without being robbed, without RBF. The method I use to transfer funds from wallets with 66 to 70 bits—I tested everything, especially 67—works with the method I created, without Marapool or Electrum. And it works. I even tried to steal from myself, and I had friends with powerful cards try

as well. I made the transfer, and 10 friends tried to steal from me, but it didn’t work. Even I tried to do an RBF, but it doesn’t replace the transaction, no matter how high I set the fee.

I found the flaw that allows thieves to steal, and if you use my method, it prevents this. If anyone wants to test with me, just let me know—I’m available. Forget Marapool and forget mining your own blocks. This is the only way I’ve managed to make it work.  I set a super low fee, and it stayed there for about 17 minutes, and no one

managed to steal it—not even I was able to replace the transaction. The only way to accelerate it was by doing a CPFP (Child Pays for Parent) on the receiver's side, and that’s it.  f anyone wants to test with me or talk to me, feel free. I had to study a lot to achieve this. Currently, I’m using a Raspberry Pi and some additional tools to make the

transfer. No boot has been able to steal from me—I’ve even tested it in under 5 seconds, and it doesn’t perform an RBF or manage to replace the transaction.

If anyone wants to test with me today, I can transfer $10 for you to try and steal it with your boots. I'll create a 67-bit key and share the address with you, okay? You can get the public key from the mempool with your bots, but you won’t be able to steal it.

Does anyone want to collaborate with a few dollars to do this today? I’ll leave the wallet here—I'll do it at 10 PM tonight. I'm in Uruguay, sorry for my bad English.

This will be the wallet (67-bit):

1BY8GQbBPGYEC58s9ckHmqf9doEX9mCKPR

Let me know who will try to steal it today and who will send some funds to this wallet!
Pages: « 1 ... 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 [355] 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 ... 639 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!