Bitcoin Forum
November 01, 2024, 09:43:46 AM *
News: Bitcoin Pumpkin Carving Contest
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: Private key for address with 5 BTC.  (Read 3704 times)
cuddlefish (OP)
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
July 19, 2011, 09:17:30 AM
Last edit: July 19, 2011, 09:28:05 AM by cuddlefish
 #1

For each 0.025 BTC that shows up at 1NFXQfoqGJBNuEXMSYJwUYGt5bJF6jbFrg past the date of this post, I will reveal a random digit (as shown by Python's random.randint(), seeded with the post number.) of the key.

It's in PEM format.

-----BEGIN EC PRIVATE KEY-----
****************************************************************
****************/***********************************************
******************************==
-----END EC PRIVATE KEY-----

As an extra wrinkle, I'll give you the sha256 hash of the private key, for your bruteforcing pleasure.

>>> hashlib.sha256(data).hexdigest()
'0d2c8b5e5aa8ed0b2c10ad8d0940ee24e5df5e48160fe09b31efeaa8e72f6083'

This is the hash of ONLY the inner part (not ---BEGIN EC PRIVATE KEY--- or ---END EC PRIVATE KEY---)
There are no newlines at the ends, only between lines.

cuddlefish (OP)
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
July 19, 2011, 09:18:47 AM
 #2

Oh, the address with the 5 BTC is 1HqtKWKCLTs4eUuvTDPpJC4AaBYMiiXWok
anthony_
Member
**
Offline Offline

Activity: 65
Merit: 10


View Profile
July 20, 2011, 03:49:25 AM
 #3

Sent 0.1BTC for the first four characters to get things started.
http://blockexplorer.com/tx/5bc74811af3886fbb4ef551fa6e28cabe02ee8470559bcbbebf155c858aae361
cuddlefish (OP)
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
July 20, 2011, 05:22:09 AM
 #4

Sent 0.1BTC for the first four characters to get things started.
http://blockexplorer.com/tx/5bc74811af3886fbb4ef551fa6e28cabe02ee8470559bcbbebf155c858aae361

>>> random.seed(3)
>>> for i in range(4): print random.randint(1, len(data))
...
39
89
60
98
>>> for i in range(4): print r[random.randint(1, len(data))]
...
f
7
C
0
anthony_
Member
**
Offline Offline

Activity: 65
Merit: 10


View Profile
July 20, 2011, 06:49:59 AM
 #5

Sent 0.1BTC for the first four characters to get things started.
http://blockexplorer.com/tx/5bc74811af3886fbb4ef551fa6e28cabe02ee8470559bcbbebf155c858aae361

>>> random.seed(3)
>>> for i in range(4): print random.randint(1, len(data))
...
39
89
60
98
>>> for i in range(4): print r[random.randint(1, len(data))]
...
f
7
C
0

from that output it doesn't show that you type random.seed the second time, so it would have continued from the last point in the PRNG and the f 7 C 0 would be wrong
Maged
Legendary
*
Offline Offline

Activity: 1204
Merit: 1015


View Profile
July 20, 2011, 07:11:54 AM
Last edit: July 20, 2011, 07:54:08 PM by Maged
 #6

Sent 0.1BTC for the first four characters to get things started.
http://blockexplorer.com/tx/5bc74811af3886fbb4ef551fa6e28cabe02ee8470559bcbbebf155c858aae361

>>> random.seed(3)
>>> for i in range(4): print random.randint(1, len(data))
...
39
89
60
98
>>> for i in range(4): print r[random.randint(1, len(data))]
...
f
7
C
0

from that output it doesn't show that you type random.seed the second time, so it would have continued from the last point in the PRNG and the f 7 C 0 would be wrong
If that's true, then this should be the correct assignment...

>>> random.seed(3)
>>> for i in range(4): print random.randint(1, 162)
...
39
89
60
98
>>> for i in range(4): print random.randint(1, 162)
...
102
11
3
136

cuddlefish (OP)
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
July 20, 2011, 02:19:23 PM
 #7

Ooops.


>>> random.seed(3)
>>> for i in range(4): e = random.randint(1, len(r)); print e; print r[e-1]
...
39
e
89
4
60
B
98
4
>>>
anthony_
Member
**
Offline Offline

Activity: 65
Merit: 10


View Profile
July 20, 2011, 08:49:17 PM
 #8

Ooops.


>>> random.seed(3)
>>> for i in range(4): e = random.randint(1, len(r)); print e; print r[e-1]
...
39
e
89
4
60
B
98
4
>>>

it appears we get the first 8 digits then =P
cuddlefish (OP)
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
July 21, 2011, 02:14:27 AM
 #9

Ooops.


>>> random.seed(3)
>>> for i in range(4): e = random.randint(1, len(r)); print e; print r[e-1]
...
39
e
89
4
60
B
98
4
>>>

it appears we get the first 8 digits then =P

No, those are the 0-indexed positions.
anthony_
Member
**
Offline Offline

Activity: 65
Merit: 10


View Profile
July 21, 2011, 05:05:23 AM
 #10

Ooops.


>>> random.seed(3)
>>> for i in range(4): e = random.randint(1, len(r)); print e; print r[e-1]
...
39
e
89
4
60
B
98
4
>>>

it appears we get the first 8 digits then =P

No, those are the 0-indexed positions.

We already got the next 4 numbers for that seed as-well is what i'm saying Wink
mc_lovin
Legendary
*
Offline Offline

Activity: 1190
Merit: 1000


www.bitcointrading.com


View Profile WWW
July 21, 2011, 09:06:22 PM
 #11

interesting little game.
PawGo
Legendary
*
Offline Offline

Activity: 952
Merit: 1385


View Profile
April 23, 2022, 05:05:04 PM
 #12

ho ho ho
What a puzzle Wink 11 year old.
I see owner was not active during last 4 years - strange that coins are still there.

It gives known part:
Code:
MHQCAQEEI**7***************************e************oAcGBSuBBAAKoUQDQgAE********/********4*******4****f*********************************0*********************==

so it is rather not possible to bruteforce for a given hash...
Seraphimjm
Newbie
*
Offline Offline

Activity: 12
Merit: 5


View Profile
April 23, 2022, 05:13:52 PM
Merited by PawGo (1)
 #13

Would have probably taken the coins sent to reveal and up to the point where it was almost easily solvable just move the coins then declare found/solved.

classic raffle ticket scheme with a little slight of hand.  The first 0.1btc sent was the bait, but there were no fish...  Grin
paapa1268
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
April 01, 2024, 11:44:33 AM
 #14

ho ho ho
What a puzzle Wink 11 year old.
I see owner was not active during last 4 years - strange that coins are still there.

It gives known part:
Code:
MHQCAQEEI**7***************************e************oAcGBSuBBAAKoUQDQgAE********/********4*******4****f*********************************0*********************==

so it is rather not possible to bruteforce for a given hash...


the only solution is to use the same version script he used and repeate process until got hit the version used by him can be seen https://lapo.it/asn1js decoder see his other post he posted random pem key decode using above mention site and in option it will give all version info used
Bill buffalo
Newbie
*
Offline Offline

Activity: 48
Merit: 0


View Profile
July 18, 2024, 06:09:37 PM
 #15

So you mean to tell me if you have the full private key of this string below MHQCAQEEI**7***************************e************oAcGBSuBBAAKoUQDQgAE********/********4*******4****f*********************************0*********************== if you can find it complete it will give access to this btc address 1HqtKWKCLTs4eUuvTDPpJC4AaBYMiiXWok that contains 5 BTC are you serious about this?
examplens
Legendary
*
Offline Offline

Activity: 3458
Merit: 3474


Crypto Swap Exchange


View Profile WWW
July 27, 2024, 10:33:14 AM
Merited by ABCbits (1)
 #16

So you mean to tell me if you have the full private key of this string below MHQCAQEEI**7***************************e************oAcGBSuBBAAKoUQDQgAE********/********4*******4****f*********************************0*********************== if you can find it complete it will give access to this btc address 1HqtKWKCLTs4eUuvTDPpJC4AaBYMiiXWok that contains 5 BTC are you serious about this?
always check first a time when the thread is open. For example, this was launched in 2011, 13 years ago, it is unlikely that the OP is still current with this offer.
it seems that there is no free money here

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Bill buffalo
Newbie
*
Offline Offline

Activity: 48
Merit: 0


View Profile
July 27, 2024, 11:56:38 AM
 #17

The private key if found gives access to this BTC addres
s 1HqtKWKCLTs4eUuvTDPpJC4AaBYMiiXWok which contains 5btc if that isn't free money what is?
apogio
Hero Member
*****
Offline Offline

Activity: 602
Merit: 1206



View Profile WWW
July 30, 2024, 08:23:32 PM
Merited by BlackHatCoiner (4), ABCbits (2)
 #18

Warning!

Back in the day, yeah, 0.025 BTC was not a lot! But I will leave my post here, in case any new member thinks this post is still active!

DON'T engage with this puzzle game! Don't send coins to any address mentioned in the OP.

Basically OP is asking for money, so this is not acceptable!
All the puzzle games so far don't ask anything in return!
There are too many ways to get scammed with this.

1. OP doesn't have a sufficient amount of merit, nor a lot of trust. Even if they did, again, it would be very irresponsible to participate in a game like this.
2. The address 1HqtKWKCLTs4eUuvTDPpJC4AaBYMiiXWok has indeed 5 BTC, but the OP didn't provide a signed message from this address, so we are not sure they hold the keys to unlock them.
3. New members may get scammed, thinking this post is still active and sending coins to the address mentioned there.

@Mods: I suggest that you remove the address from the OP... You never know if anyone is silly enough to send coins to this address.


█████████████████████████
████████▀▀████▀▀█▀▀██████
█████▀████▄▄▄▄████████
███▀███▄███████████████
██▀█████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██▄███████████████▀▀▄▄███
███▄███▀████████▀███▄████
█████▄████▀▀▀▀████▄██████
████████▄▄████▄▄█████████
█████████████████████████
 
 BitList 
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
REAL-TIME DATA TRACKING
CURATED BY THE COMMUNITY

.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
 
  List #kycfree Websites   
BlackHatCoiner
Legendary
*
Offline Offline

Activity: 1694
Merit: 8318


Bitcoin is a royal fork


View Profile WWW
August 02, 2024, 04:01:55 PM
Merited by SamReomo (1)
 #19

There are two things strange in this topic, and honestly, I don't know which one is stranger.

  • The private key is generated and partially displayed in PEM. When were private keys generated like that? It seems like this person manually generated an EC private key and generated its address with some custom script.
  • The 5 BTC have not moved. This is extremely odd, IMO, because when this "challenge" started, 5 BTC were worth about $70. Now, they are worth more than $300,000. It's even weirder, when you realize that the OP was last time active in 2018, discussing about altcoins. Usually, people who did that back in 2018, had likely sold their bitcoin for some shitcoin.

The most plausible scenario, given this information, is that the OP has no access to the 5 BTC. They funded an address which might have been created using a custom script, and which was later discovered it was flawed. There are many examples, similar to that, where people did testings in bitcoin mainnet and lost access to their coins forever.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
ABCbits
Legendary
*
Offline Offline

Activity: 3052
Merit: 8018


Crypto Swap Exchange


View Profile
August 03, 2024, 11:14:39 AM
 #20

  • The private key is generated and partially displayed in PEM. When were private keys generated like that? It seems like this person manually generated an EC private key and generated its address with some custom script.

I would speculate 2013 or older. OpenSSL was popular library, before secp256k1 library created since late 2013. It's so popular that someone made bounty to convert PEM public key to Bitcoin address, https://bitcointalk.org/index.php?topic=2631.0.

  • The 5 BTC have not moved. This is extremely odd, IMO, because when this "challenge" started, 5 BTC were worth about $70. Now, they are worth more than $300,000. It's even weirder, when you realize that the OP was last time active in 2018, discussing about altcoins. Usually, people who did that back in 2018, had likely sold their bitcoin for some shitcoin.

Or OP lost access to that address, since BTC in 2011 wasn't that valuable.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!