Bitcoin Forum
August 17, 2025, 11:28:12 PM *
News: Latest Bitcoin Core release: 29.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 [519] 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 ... 576 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 330105 times)
CriptoGiga
Newbie
*
Offline Offline

Activity: 4
Merit: 0


View Profile
May 28, 2025, 11:33:49 AM
 #10361

Hi everyone. Can anyone share the private key they found in range #71 starting with f6f5431d25bbf7... or less characters.
Thanks for your help!   Roll Eyes

0000000000000000000000000000000000000000000000500000000304615F9C 1PWo3JeF5pJr8BDtMN6QFQmjs8p6gj5KgU 1475739525909722521500 f6f5431d2a99ce4fa2fd37a38586529fb9df8682
0000000000000000000000000000000000000000000000600000000DEEE121A7 1PWo3Je7tFEUnDZRvcaJokKFoW1VyucA6z 1770887431135959261607 f6f5431d21b0e2d35f05cd9f91ed2d8aac510571
000000000000000000000000000000000000000000000070000000176EC8012B 1PWo3Je8FDc3uMyWnFQgqLGGirVp98SyVG 2066035336356112630059 f6f5431d2223713ae7827b5e2d82ce0d331de076
POD5
Member
**
Offline Offline

Activity: 323
Merit: 10

Keep smiling if you're loosing!


View Profile
May 28, 2025, 12:25:03 PM
 #10362

When playing with some iceland tools which is https://github.com/iceland2k14/kangaroo i got this speed on CPU
 
  • [24894.64 TeraKeys/s][Kang 28672][Count 2^29.29/2^29.10][Elapsed 06s][Dead 1][RAM 53.4MB/46.0MB]

Is it good bad fake idk but like i know iceland tools are good

iceland2k14 is proprietary and all his tools contain backdoor
do not use iceland2k14 libraries unless you want to loose your keys or findings
good luck

If you suspect that there is a backdoor in it, you can always use it offline.
If it doesn not work offline, than you should be worried about it.
But I don't think ICELAND is puting some backdoors in his apps...

bc1qtmtmhzp54yvkz7asnqxc9j7ls6y5g93hg08msa
mjojo
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 28, 2025, 01:54:41 PM
 #10363

When playing with some iceland tools which is https://github.com/iceland2k14/kangaroo i got this speed on CPU
 
  • [24894.64 TeraKeys/s][Kang 28672][Count 2^29.29/2^29.10][Elapsed 06s][Dead 1][RAM 53.4MB/46.0MB]

Is it good bad fake idk but like i know iceland tools are good

iceland2k14 is proprietary and all his tools contain backdoor
do not use iceland2k14 libraries unless you want to loose your keys or findings
good luck

If you suspect that there is a backdoor in it, you can always use it offline.
If it doesn not work offline, than you should be worried about it.
But I don't think ICELAND is puting some backdoors in his apps...
Agree with you, if we just script kiddiot please appreciate to all contributor who gave their code and their effort in free
nochkin
Member
**
Offline Offline

Activity: 74
Merit: 12


View Profile
May 28, 2025, 01:58:47 PM
 #10364

all his tools contain backdoor
do not use iceland2k14 libraries unless you want to loose your keys or findings
Any proof for this or that's just your guess?
kTimesG
Full Member
***
Offline Offline

Activity: 560
Merit: 183


View Profile
May 28, 2025, 02:11:37 PM
 #10365

If I understood your question right, maybe one possible way to simplify the check is to first verify whether both points are n-torsion points (nP = O and nQ = O). If not, you can already rule out that they belong to the same n-order subgroup. If they both are, i think you have to build up the entire subgroup as you said, i don't think there is a direct way to check. But at least the n-torsion check can help "quickly" exclude cases that definitely don’t match, or at least use less computation. Could this make sense?

I used the wrong terminology. I meant quick-checking whether two points belong to the same orbit. Since n - 1 divides by 2, 3, 149, 631, .... So all points on the curve can be grouped in orbits of size 2, 3, 149, 631. The sum of all points (and scalars) of each distinct orbit is O (0).

In the end, any valid point has a unique 7-dimensional scalar. I think a trial and error search of common coefficients on lower dimensions (same orbit, or finding the distance between orbits) may simplify the ECDLP (with some sort of pollard rho). It might also be nothin'.

Off the grid, training pigeons to broadcast signed messages.
mjojo
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 28, 2025, 02:28:58 PM
 #10366


If you want in my GitHub you can find VanitySearch-bitcrack repo, 50% faster than these
Hi @fixedpaul when you release for multiple GPU, so far your repo is the fastest VanitySearch I tested. thank
nochkin
Member
**
Offline Offline

Activity: 74
Merit: 12


View Profile
May 28, 2025, 03:00:21 PM
 #10367

what kind of speed should i expect when using python to brute force 12 word bip39 seed phrase from word list?
Pure Python implementation should get you maybe like a dozen or two per second, that's all.
nochkin
Member
**
Offline Offline

Activity: 74
Merit: 12


View Profile
May 28, 2025, 03:43:21 PM
 #10368

what kind of speed should i expect when using python to brute force 12 word bip39 seed phrase from word list?
Pure Python implementation should get you maybe like a dozen or two per second, that's all.

it shows around 10000h/s
Sounds like you are doing part of the work only. I was testing the whole thing like getting a list of deterministic keys/addresses and so on.
snaz3d
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
May 29, 2025, 12:40:38 AM
 #10369

Y'all should get a job.
nochkin
Member
**
Offline Offline

Activity: 74
Merit: 12


View Profile
May 29, 2025, 12:54:46 AM
 #10370

Y'all should get a job.
It's a job. A non-paying one, but a job.
MrGPBit
Jr. Member
*
Offline Offline

Activity: 47
Merit: 1


View Profile
May 29, 2025, 01:19:52 PM
 #10371

Y'all should get a job.

Bitcoin Hunter is an official job
nameavailable
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile
May 29, 2025, 02:10:45 PM
 #10372

I've spent 3.5 years studying this sequence instead of trying to brute force. I have developed thousands of algorithms and analysis scripts.
This morning I successfully and efficiently reversed engineered indexes 1-69 perfectly generating them all without hard coding any keys.. GrinBTC

<3
MrGPBit
Jr. Member
*
Offline Offline

Activity: 47
Merit: 1


View Profile
May 29, 2025, 02:16:13 PM
 #10373

I've spent 3.5 years studying this sequence instead of trying to brute force. I have developed thousands of algorithms and analysis scripts.
This morning I successfully and efficiently reversed engineered indexes 1-69 perfectly generating them all without hard coding any keys.. GrinBTC

<3

Please share your experience and I code
nameavailable
Newbie
*
Offline Offline

Activity: 10
Merit: 0


View Profile
May 29, 2025, 02:38:40 PM
 #10374

what kind of speed should i expect when using python to brute force 12 word bip39 seed phrase from word list?


not worth the time unless you are 100% sure on about 8-9 of them..minimum
Frequence
Newbie
*
Offline Offline

Activity: 26
Merit: 2


View Profile
May 29, 2025, 03:15:38 PM
 #10375

what kind of speed should i expect when using python to brute force 12 word bip39 seed phrase from word list?
Pure Python implementation should get you maybe like a dozen or two per second, that's all.

it shows around 10000h/s
Sounds like you are doing part of the work only. I was testing the whole thing like getting a list of deterministic keys/addresses and so on.

atleast it found test phrase.
now playing with https://privatekeys.pw/puzzles/0.2-btc-puzzle

Code:
import time
import itertools
from multiprocessing import Pool, cpu_count
import hashlib, struct, base58
from ecdsa import SigningKey, SECP256k1

# === Configuration ===
TARGET_ADDRESS = "1KfZGvwZxsvSmemoCmEV75uqcNzYBHjkHZ"

#
position_words = {
    1:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    2:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    3:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    4:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    5:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    6:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    7:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    8:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    9:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    10: ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    11: ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    12: ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"]
}

REPORT_INTERVAL = 5  # seconds

# === Private key to P2PKH address ===
def private_to_address(priv):
    sk = SigningKey.from_string(priv, curve=SECP256k1)
    pub = b'\x04' + sk.verifying_key.to_string()
    sha = hashlib.sha256(pub).digest()
    ripe = hashlib.new('ripemd160', sha).digest()
    prefixed = b'\x00' + ripe
    checksum = hashlib.sha256(hashlib.sha256(prefixed).digest()).digest()[:4]
    return base58.b58encode(prefixed + checksum).decode()

# === Electrum v1 seed to address ===
def electrum_seed_to_addr(seed_words):
    phrase = ' '.join(seed_words)
    seed = hashlib.sha512(phrase.encode('utf-8')).digest()
    priv_key = seed[:32]
    return private_to_address(priv_key)

# === Combination checker ===
def check_combination(combo):
    if len(set(combo)) < len(combo):  # enforce unique words
        return None
    try:
        address = electrum_seed_to_addr(combo)
        if address == TARGET_ADDRESS:
            return combo
    except:
        return None
    return None

# === Parallel combination scanner ===
def scan_combinations_parallel():
    word_lists = [position_words[i + 1] for i in range(12)]
    total = 1
    for lst in word_lists:
        total *= len(lst)

    print(f"Scanning {total:,} Electrum v1 seed combinations using {cpu_count()} cores...")

    start = time.time()
    last_report = start
    pool = Pool(cpu_count())

    generator = itertools.product(*word_lists)

    for i, result in enumerate(pool.imap_unordered(check_combination, generator, chunksize=500)):
        now = time.time()
        if now - last_report >= REPORT_INTERVAL:
            elapsed = now - start
            speed = i / elapsed
            progress = (i / total) * 100
            print(f"[{elapsed:.1f}s] Checked: {i:,} | Speed: {speed:,.0f}/s | Progress: {progress:.6f}%")
            last_report = now

        if result:
            print("\nSUCCESS! Valid Electrum seed found:")
            print(" ".join(result))
            print(f"Address: {TARGET_ADDRESS}")
            pool.terminate()
            return

    print("\nDone. No matching Electrum-style mnemonic found.")

# === Main ===
if __name__ == "__main__":
    scan_combinations_parallel()


hopeless:
Scanning 23,298,085,122,481 Electrum v1 seed combinations using 8 cores...
[5.0s] Checked: 5,108,500 | Speed: 1,021,699/s | Progress: 0.000022%

Don’t waste your time on this  it’s an endless attempt with near zero chance of success. Thhe creator hasn’t updated or even signed the puzzle address. It’s not worth 0.2 BTC; you’re better off sticking with the 32 BTC puzzle instead.
Frequence
Newbie
*
Offline Offline

Activity: 26
Merit: 2


View Profile
May 29, 2025, 06:58:17 PM
 #10376

what kind of speed should i expect when using python to brute force 12 word bip39 seed phrase from word list?
Pure Python implementation should get you maybe like a dozen or two per second, that's all.

it shows around 10000h/s
Sounds like you are doing part of the work only. I was testing the whole thing like getting a list of deterministic keys/addresses and so on.

atleast it found test phrase.
now playing with https://privatekeys.pw/puzzles/0.2-btc-puzzle



hopeless:
Scanning 23,298,085,122,481 Electrum v1 seed combinations using 8 cores...
[5.0s] Checked: 5,108,500 | Speed: 1,021,699/s | Progress: 0.000022%

Don’t waste your time on this  it’s an endless attempt with near zero chance of success. Thhe creator hasn’t updated or even signed the puzzle address. It’s not worth 0.2 BTC; you’re better off sticking with the 32 BTC puzzle instead.


It is useless mess. As i can see it is electrum 1626, but can not find even 12 correct candinates.

advanceed research :
https://github.com/AlberTajuelo/bitcoin-0.2-image-puzzle/tree/master
nochkin
Member
**
Offline Offline

Activity: 74
Merit: 12


View Profile
May 30, 2025, 03:52:50 AM
 #10377

hopeless:
Scanning 23,298,085,122,481 Electrum v1 seed combinations using 8 cores...
[5.0s] Checked: 5,108,500 | Speed: 1,021,699/s | Progress: 0.000022%
It does not look like your code is actually doing its job. It does not even try to search for the address, this is why the speed is for doing basically nothing.
MrGPBit
Jr. Member
*
Offline Offline

Activity: 47
Merit: 1


View Profile
May 30, 2025, 07:30:24 AM
 #10378

hopeless:
Scanning 23,298,085,122,481 Electrum v1 seed combinations using 8 cores...
[5.0s] Checked: 5,108,500 | Speed: 1,021,699/s | Progress: 0.000022%
It does not look like your code is actually doing its job. It does not even try to search for the address, this is why the speed is for doing basically nothing.

you did not even try.

Code:
import time
import itertools
from multiprocessing import Pool, cpu_count
import hashlib, struct, base58
from ecdsa import SigningKey, SECP256k1

# === Configuration ===
TARGET_ADDRESS = "1ATUAMkg2y9mFB2fEJCmovt53bsgaiG5Ug"

# breathe black tower truth food liberty moon mask subject proof vote real
position_words = {
    1:  ["food","this", "subject", "breathe", "black", "order", "vote"],
    2:  ["food","this", "subject", "real", "black", "order", "vote"],
    3:  ["food","this", "subject", "breathe", "tower", "order", "vote"],
    4:  ["truth"],
    5:  ["food","this", "subject", "real", "black", "order", "vote"],
    6:  ["liberty"],
    7:  ["moon"],
    8:  ["food","this", "subject", "mask", "black", "order", "vote"],
    9:  ["food","this", "subject", "real", "black", "order", "vote"],
    10: ["food","this", "subject", "real", "black", "order", "proof"],
    11: ["food","this", "subject", "real", "black", "order", "vote"],
    12: ["food","this", "subject", "real", "black", "order", "vote"]
}


REPORT_INTERVAL = 5  # seconds


# === Private key to P2PKH address ===
def private_to_address(priv):
    sk = SigningKey.from_string(priv, curve=SECP256k1)
    pub = b'\x04' + sk.verifying_key.to_string()
    sha = hashlib.sha256(pub).digest()
    ripe = hashlib.new('ripemd160', sha).digest()
    prefixed = b'\x00' + ripe
    checksum = hashlib.sha256(hashlib.sha256(prefixed).digest()).digest()[:4]
    return base58.b58encode(prefixed + checksum).decode()

# === Electrum v1 seed to address ===
def electrum_seed_to_addr(seed_words):
    phrase = ' '.join(seed_words)
    seed = hashlib.sha512(phrase.encode('utf-8')).digest()
    priv_key = seed[:32]
    return private_to_address(priv_key)

# === Combination checker ===
def check_combination(combo):
    if len(set(combo)) < len(combo):  # enforce unique words
        return None
    try:
        address = electrum_seed_to_addr(combo)
        if address == TARGET_ADDRESS:
            return combo
    except:
        return None
    return None

# === Parallel combination scanner ===
def scan_combinations_parallel():
    word_lists = [position_words[i + 1] for i in range(12)]
    total = 1
    for lst in word_lists:
        total *= len(lst)

    print(f"Scanning {total:,} Electrum v1 seed combinations using {cpu_count()} cores...")

    start = time.time()
    last_report = start
    pool = Pool(cpu_count())

    generator = itertools.product(*word_lists)

    for i, result in enumerate(pool.imap_unordered(check_combination, generator, chunksize=1000)):
        now = time.time()
        if now - last_report >= REPORT_INTERVAL:
            elapsed = now - start
            speed = i / elapsed
            progress = (i / total) * 100
            print(f"[{elapsed:.1f}s] Checked: {i:,} | Speed: {speed:,.0f}/s | Progress: {progress:.6f}%")
            last_report = now

        if result:
            print("\nSUCCESS! Valid Electrum seed found:")
            print(" ".join(result))
            print(f"Address: {TARGET_ADDRESS}")
            pool.terminate()
            return

    print("\nDone. No matching Electrum-style mnemonic found.")

# === Main ===
if __name__ == "__main__":
    scan_combinations_parallel()

Scanning 40,353,607 Electrum v1 seed combinations using 8 cores...
[5.0s] Checked: 6,381,000 | Speed: 1,276,035/s | Progress: 15.812713%
[10.0s] Checked: 12,892,272 | Speed: 1,289,032/s | Progress: 31.948252%
[15.0s] Checked: 18,649,000 | Speed: 1,242,677/s | Progress: 46.213961%

SUCCESS! Valid Electrum seed found:
breathe black tower truth food liberty moon mask subject proof vote real
Address: 1ATUAMkg2y9mFB2fEJCmovt53bsgaiG5Ug

actual range goes very small when you think list is shorter after each position,
like lottery balls in certain order.
count invalid seed or not, i dont care.
just with 12 words is 479001600, 24 is 620448401733239439360000


Can you also adapt python code for Electrum Seed Version v2+?
Akito S. M. Hosana
Jr. Member
*
Offline Offline

Activity: 392
Merit: 8


View Profile
May 30, 2025, 08:58:51 AM
 #10379

Everyone give up, don't be cheated of life, because time is life

Bro, time doesn’t even exist in the U.S.  Embarrassed
Retarded Coder
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
May 30, 2025, 10:23:51 AM
 #10380


# === Electrum v1 seed to address ===
def electrum_seed_to_addr(seed_words):
    phrase = ' '.join(seed_words)
    seed = hashlib.sha512(phrase.encode('utf-8')).digest()
    priv_key = seed[:32]
    return private_to_address(priv_key)


Mnemonics don't work like that.
Your code is complete nonsense.
Pages: « 1 ... 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 [519] 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 ... 576 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!