|
SkyDr4k3
Newbie
Offline
Activity: 146
Merit: 0
|
|
March 22, 2021, 07:26:19 PM |
|
how do i divide (reduce) this period in half or three quarters?
0000000000000000000000000000000000000000000000000000000001000000: 000000000000000000000000000000000000001ffffffffffffffffff
I would like to try to solve the puzzle but i have to reduce it. I would also avoid starting from the first number, I believe many have already tried it from the beginning.
Thank you very much
|
|
|
|
WanderingPhilospher
Full Member
Offline
Activity: 1204
Merit: 237
Shooters Shoot...
|
|
March 22, 2021, 07:46:27 PM |
|
how do i divide (reduce) this period in half or three quarters?
0000000000000000000000000000000000000000000000000000000001000000: 000000000000000000000000000000000000001ffffffffffffffffff
I would like to try to solve the puzzle but i have to reduce it. I would also avoid starting from the first number, I believe many have already tried it from the beginning.
Thank you very much
If you are using bitcrack, use the -share option. or use a simple python script to set up the ranges for you.
|
|
|
|
fxsniper
Member
Offline
Activity: 406
Merit: 47
|
|
March 24, 2021, 02:55:16 AM |
|
Hello, I have compiled the latest cuBitCrack.exe to work on a Tesla V100 on a Windows server but when I run it I think the speed is to slow for my GPU. I used this command for testing ./cuBitCrack.exe -u -c --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A and it shows Tesla V100-SXM2- 342 / 16258MB | 1 target 3.44 MKey/s (434,110,464 total) [00:02:04] By my calculations it should be at least 40-50 MKey/s with Tesla... Any ideas to improve speed, maybe some commands or do I have to recompile? ask help tuning from bitcrack thread remove -u -c and use -b 40 -t 512 ./cuBitCrack.exe -b 40 -t 512 --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A my friend try Tesla V100 get 140 MKey/s still slow same
|
|
|
|
zielar (OP)
|
|
March 25, 2021, 01:40:16 AM |
|
Hello, I have compiled the latest cuBitCrack.exe to work on a Tesla V100 on a Windows server but when I run it I think the speed is to slow for my GPU. I used this command for testing ./cuBitCrack.exe -u -c --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A and it shows Tesla V100-SXM2- 342 / 16258MB | 1 target 3.44 MKey/s (434,110,464 total) [00:02:04] By my calculations it should be at least 40-50 MKey/s with Tesla... Any ideas to improve speed, maybe some commands or do I have to recompile? ask help tuning from bitcrack thread remove -u -c and use -b 40 -t 512 ./cuBitCrack.exe -b 40 -t 512 --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A my friend try Tesla V100 get 140 MKey/s still slow same try this parameters: -b 80 -t 512 -p 2800
|
If you want - you can send me a donation to my BTC wallet address 31hgbukdkehcuxcedchkdbsrygegyefbvd
|
|
|
Robert_BIT
Newbie
Offline
Activity: 33
Merit: 0
|
|
March 25, 2021, 11:28:46 AM |
|
Hello, I have compiled the latest cuBitCrack.exe to work on a Tesla V100 on a Windows server but when I run it I think the speed is to slow for my GPU. I used this command for testing ./cuBitCrack.exe -u -c --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A and it shows Tesla V100-SXM2- 342 / 16258MB | 1 target 3.44 MKey/s (434,110,464 total) [00:02:04] By my calculations it should be at least 40-50 MKey/s with Tesla... Any ideas to improve speed, maybe some commands or do I have to recompile? ask help tuning from bitcrack thread remove -u -c and use -b 40 -t 512 ./cuBitCrack.exe -b 40 -t 512 --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A my friend try Tesla V100 get 140 MKey/s still slow same try this parameters: -b 80 -t 512 -p 2800 Thanks guys. @zielar, so far your settings are the fastest -b 80 -t 512 -p 2800
|
|
|
|
rtxgold
Newbie
Offline
Activity: 7
Merit: 0
|
|
March 27, 2021, 03:43:39 AM |
|
Add this to your collection between 63 and 65 000000000000000000000000000000000000000000000001A838B13505AF4FE3 1NBPhFPhptwNuhBTbbjtE1qHLTtkt5MLw2 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8VqzJLGd9Uu3 https://i.ibb.co/kXrpFnQ/huir.jpg
|
|
|
|
sssergy2705
Copper Member
Jr. Member
Offline
Activity: 205
Merit: 1
|
|
March 27, 2021, 03:53:45 AM |
|
Add this to your collection between 63 and 65 000000000000000000000000000000000000000000000001A838B13505AF4FE3 1NBPhFPhptwNuhBTbbjtE1qHLTtkt5MLw2 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8VqzJLGd9Uu3 For what? I alone can throw billions of addresses, but why are they empty?
|
|
|
|
rtxgold
Newbie
Offline
Activity: 7
Merit: 0
|
|
March 27, 2021, 04:27:48 AM |
|
Add this to your collection between 63 and 65 000000000000000000000000000000000000000000000001A838B13505AF4FE3 1NBPhFPhptwNuhBTbbjtE1qHLTtkt5MLw2 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8VqzJLGd9Uu3 https://i.ibb.co/kXrpFnQ/huir.jpgFor what? I alone can throw billions of addresses, but why are they empty? The goal is to find the keys corresponding to the specified addresses, not to make money. The found address is not a specified one but it is helpful for those who are trying to find the base encryption algorithm. The private key is in the specified range and can be useful in generation algorithm study. One is to do math and another is to do brute force, but both work. Good luck
|
|
|
|
|
CanalGanheAgora
Newbie
Offline
Activity: 24
Merit: 0
|
|
March 28, 2021, 08:26:13 PM |
|
Range # 120 and the time it takes to decode it at the moment with my GPU's overbooking is too large for me to start working on it without collision right now. JeanLucPons is busy with other projects (his professional life is more than working on another program) and therefore not active in other programming projects. I will probably start work on # 120 with JeanLucPons in due course, but I don't know when it will happen at the moment. how long would it take in that interval? ---> 8147ae147ae147ae:828f5c28f5c28f5c
|
|
|
|
WanderingPhilospher
Full Member
Offline
Activity: 1204
Merit: 237
Shooters Shoot...
|
|
April 01, 2021, 02:44:02 AM |
|
Update on VanBitCracken Spread: I've been running 4 days straight (which is abnormally long for me, I usually get bored and mess with range or something) with a 4 card setup. I have checked 2^50.43 keys in those 4 days, all spread out covering the entire 64 bit range. Results so far: 16jY7qLJnnQqyCNQCkN22hweBx5sqhVQt2 A60D94B605F6DEED 16jY7qLJnEvB2ResF64UmeHFW9wxaSVTm4 95C4CF22F7E40B09 16jY7qLJnR41HiykutYG8MAzSZKr6C3K9f 9E7EC80F2F18C935 16jY7qLJn8w1VH9tLyAzDtk4siQV8huNk6 9DF0FBD50F6C7A4C 16jY7qLJn6zRW1jAWPxiG9JFW72pADSMot B8999AF68799CDCF 16jY7qLJnnkjdFXZcPGy2tMjUPQQApEmDc 9B54D134631E5B19 16jY7qLJng2SMHU4SMXPjfawtGCvhHgaSS B295E10BBE9EC144 16jY7qLJn3UJLMK4nWyLJgpsj7FCUmk1N2 FD01E965E06F7243 16jY7qLJnFpswGCQLBKoStQCoevvQb53G1 986EBB933EEE0962 16jY7qLJnxht5HL2NBywuoC8jK34rz8NJv 9357254130F9270A 16jY7qLJnbwfCSSRXivZnCFG6phBAYvT1b 89F84ED1040B8782 16jY7qLJnikKMRWYNo4U5AMLCSZpb99jTJ 8A500564D1A344A2 16jY7qLJnsEheSTVBw7q7KBfhmF8aT96yu 8A6153AA9FBFE29C 16jY7qLJnrf1AVepwCAZPtXBSnaSyKtVpt E719146F2C8A64F6 16jY7qLJn6vYeDSgzKpdocFLhudWPsCLCV FF696CFF78DD33C2 16jY7qLJnkUt7BDW4sjN1gBJu75yQzuA4d C079D2F2255CB2AB 16jY7qLJnncxUo9uzrBVntYQHEperUMoNm B817117EA76EA2D2 16jY7qLJnj1na3USbUBXERGMtCMYbkJZSe D1161C4A0FEDB1A8 16jY7qLJnX9uchnyf26t3QJnsUf78Xdikb E428E81F902CDEE0 16jY7qLJny2n471fXJxpNiGURGavggRci4 FBBB802CCEAE9E5C 16jY7qLJngSEfpYoYVwEFC7aja8HNkqYb9 C57FC2E3392D09BE 16jY7qLJnAj7kEUY1fXkwLGeWragN42b4q AC6D1F87FE564205 16jY7qLJnQVihCA2Fcf6dDF9sYpA3TraHM B2885F30E6063B77 16jY7qLJnHPYTL5daotAZJudvupQ3Wk2kw 8BB203974D48B13C 16jY7qLJnXfwnsfDQsDs72vJJu5XTmPDqJ 8DD4ECD2E4EB2CDD 16jY7qLJnN78hncq2kyRSSPjL49HRAJAwb CCF2FA5AC3D43641 16jY7qLJnudSwk6jCSLLKzkZWgdydniDAe FD62B95C5BA1F037 16jY7qLJnF5zbMPjJE4kQCey7cxSeL45ex 90FDF4846B8DCD6F 16jY7qLJn8XpckUucZnqVMKVTjUUXiXaE3 DD924F75C06C3E9E 16jY7qLJnwZafDg2PTxkEprtKjimqBv4wa E1BDE5D2314C47CA 16jY7qLJn2g5BahcxgNQybjGX8kLeRP3D9 DACF859A61792AD4 16jY7qLJnr1xzcTFJP1GjjG5urgz4fhSC5 B1FB0C0A8F03DB0D
I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC. But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck. I'll let it ride for at least another 6-8 hours and see what happens.
|
|
|
|
fxsniper
Member
Offline
Activity: 406
Merit: 47
|
|
April 01, 2021, 05:19:38 AM |
|
I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC. But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck. I'll let it ride for at least another 6-8 hours and see what happens.
I do search by string too I just try do experiment about look a pattern problem all puzzle is not create by pattern all is absolute random problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference conclusion no pattern 16454495722324959939 16jY7qK5oW1wnfKRN6uj1ASVdds6aouxDX 3ee4133d41444731cd7beb48b26d3a501fc744ce 359043673673754458109913579780954779489629848782 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ4hn8W4n7yeaG9rram8 000000000000000000000000000000000000000000000000E45A1CAE075D22C3 15356914462326594163 16jY7qK6wNNFqnR4k1UGUmfv7TFvTrfUbd 3ee4133d42ac12d331b91511632880f5413f9a53 359043673675622622798033731761492103220271487571 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3SCCx52gr4araCbtaR 000000000000000000000000000000000000000000000000D51EB856CD091A73 14084089149906511880 16jY7qK9UeLf4rFYrQsoqQnYbuNpSU9si6 3ee4133d45d08b8400891186f72ccbc24cfdd40b 359043673679799677369610125758950696635980436491 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ1xrrHCkz9TeKqnueyf 000000000000000000000000000000000000000000000000C374BC760D1C6808 10957366083765617198 16jY7qKJTia8qA2HRyCH8ttkDK48ynC1qW 3ee4133d50eed586e09a754d9cea64bd8a8e99cf 359043673694578455355112905559483281244005767631 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxMEeazeLdb25mbUBw9 0000000000000000000000000000000000000000000000009810626608C3422E 15338467798463623790 16jY7qKXvAbWydkoECFnvC4B6tjBrEKWhN 3ee4133d6195ed5c8e3a8d5403e938cf0f43ca84 359043673716713700287800823551761138585853741700 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3QxUe4KUp4Qyb5bTtR 000000000000000000000000000000000000000000000000D4DD2F322E31326E 12018053845398380115 16jY7qKYE8yqVeeo2BQ2GEuxzccLtrXruQ 3ee4133d61f818fbacb8d98050673320fb5d9f8b 359043673717223430130265268114148103754155401099 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYyaM7UjWXwrcJJnbQe2 000000000000000000000000000000000000000000000000A6C8B44C4A7CDE53 15919540175014676452 16jY7qKq9YFpbNv7hE9rAegbnzQxThjb9y 3ee4133d76e8ddd9249feed6118b39026ca024b6 359043673745058134190826254367550950173015286966 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ45uxygmUpuWfLF3Yys 000000000000000000000000000000000000000000000000DCED91719F4F47E4 14960309530126404974 16jY7qL3Lk1F6doZRESLuyL1K5jQ4eqx6A 3ee4133d85ffdce51ba9dc109c8ab8b18507a68a 359043673765115957620901275540833771579488315018 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ2yc1u6yhHBLx5U9MV5 000000000000000000000000000000000000000000000000CF9DB24129134D6E 15163223678565228562 16jY7qL53WH9mqfiGnDVNu4E5cmpaTt2uJ 3ee4133d881b5811bdba44b047547989c0ed3f6e 359043673767917103900228355891329549583627665262 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3DD3WJbyCwwmeMLipV 000000000000000000000000000000000000000000000000D26E9798F2AC2012 17690427578206221414 16jY7qL5MmbBuUPN3pjLgLyCKNCAnMyuPL 3ee4133d887f1bc6b3762a22de2bdca6e91ae941 359043673768435110696216248540087649519577786689 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ68e2XDu8T3FmYF4H64 000000000000000000000000000000000000000000000000F58106278BC17466 14130206010662142352 16jY7qLBfZwny9vSBX1G45XkLFB1jAzqZ7 3ee4133d904d3c7a19809acc9ee368e5ac76fef7 359043673778809983070097333345067472077834354423 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ21xB6s78CZR1uPt36f 000000000000000000000000000000000000000000000000C41893806C9B4190 13355442818363142526 16jY7qLED7wcq3mw3gWq3PqwtnmoZcQYBk 3ee4133d93733783fef9051366cb7392af95097a 359043673782994873710099489007655791452168194426 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ181XK3xsR9gWHUgvez 000000000000000000000000000000000000000000000000B958107BAE93B17E 16943334460982138399 16jY7qLGAvZw8JXVeDe6dKz2mdQfgDLyME 3ee4133d95e0dadc9e7043138d4236e8d8aaf03f 359043673786222603113445584966135603418991620159 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5GYyDTyLjCLEii1f7k 000000000000000000000000000000000000000000000000EB22D0EC3179961F 17625864068125699820 16jY7qLK8rBoKkAEfdQMMZDX2yogfjZinv 3ee4133d998bf7eff1f284ea13c3f0277b2753a3 359043673791098759584668108861628840569146397603 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ64JyPjsWtcpdWfBdvm 000000000000000000000000000000000000000000000000F49BA5FBEFF42EEC 15753519546411984270 16jY7qLKagtc9cypcLj3Ui3QhcQgndY29t 3ee4133d9a191d487e39da0068db61a2a21a7765 359043673791831630906369292845610890857495033701 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3tnQ32KETDrkAXS8b4 000000000000000000000000000000000000000000000000DA9FBE8FCE0F258E 10985036183770518811 16jY7qLU3rWzA5WzpV4BuDW6yh7Xv8wbn4 3ee4133da4940a6c8157683f58ce3924288c90dc 359043673805762180865213802119997989261188829404 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxP6F5Nmpm3UswAqn9p 0000000000000000000000000000000000000000000000009872B0353A74551B 11114163388052541195 16jY7qLXbTXPSciC46crGHs4DqH3EaSdHe 3ee4133da8f71f2df32e42748ecdb7d3e49aa303 359043673811593551211807398525934563932772147971 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxXkMNkX743SmHrYB2P 0000000000000000000000000000000000000000000000009A3D70B750860F0B 12811263834395200302 16jY7qLYUz7iQLiAWpCvSFDmgYB5638mMR 3ee4133daa10955629e2f547c710dff740908428 359043673813054983139446058212669508452736861224 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYzVXVcJ9Fv937ruhXMy 000000000000000000000000000000000000000000000000B1CAC09494EF4B2E
|
|
|
|
WanderingPhilospher
Full Member
Offline
Activity: 1204
Merit: 237
Shooters Shoot...
|
|
April 01, 2021, 06:27:13 AM |
|
I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC. But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck. I'll let it ride for at least another 6-8 hours and see what happens.
I do search by string too I just try do experiment about look a pattern problem all puzzle is not create by pattern all is absolute random problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference conclusion no pattern Correct, there is no pattern, I wasn't/am not looking for a pattern, I am looking for the actual address. I only use string because I have to versus the full address and the program searching for RIPEMD160 (much faster). Add 2 more characters to your string like mine and see what you come up with. (16jY7qLJn)
|
|
|
|
fxsniper
Member
Offline
Activity: 406
Merit: 47
|
|
April 01, 2021, 01:24:51 PM |
|
Correct, there is no pattern, I wasn't/am not looking for a pattern, I am looking for the actual address. I only use string because I have to versus the full address and the program searching for RIPEMD160 (much faster). Add 2 more characters to your string like mine and see what you come up with. (16jY7qLJn)
I not looking for pattern of address but I try looking to group pattern of hash160 I try to looking for position of key where is it example like if on near 17625864068125699820 I will be using bitcrack scan that zone 2**64 all key but problem it can be every where on range no pattern both prefix suffix address may be really crack it possible do at level bit, who can read and calculate buy bit may be can solve because both hex and any human read characters just for human read but may be about bits for all
|
|
|
|
CanalGanheAgora
Newbie
Offline
Activity: 24
Merit: 0
|
|
April 01, 2021, 03:14:34 PM |
|
I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC. But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck. I'll let it ride for at least another 6-8 hours and see what happens.
I do search by string too I just try do experiment about look a pattern problem all puzzle is not create by pattern all is absolute random problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference conclusion no pattern 16454495722324959939 16jY7qK5oW1wnfKRN6uj1ASVdds6aouxDX 3ee4133d41444731cd7beb48b26d3a501fc744ce 359043673673754458109913579780954779489629848782 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ4hn8W4n7yeaG9rram8 000000000000000000000000000000000000000000000000E45A1CAE075D22C3 15356914462326594163 16jY7qK6wNNFqnR4k1UGUmfv7TFvTrfUbd 3ee4133d42ac12d331b91511632880f5413f9a53 359043673675622622798033731761492103220271487571 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3SCCx52gr4araCbtaR 000000000000000000000000000000000000000000000000D51EB856CD091A73 14084089149906511880 16jY7qK9UeLf4rFYrQsoqQnYbuNpSU9si6 3ee4133d45d08b8400891186f72ccbc24cfdd40b 359043673679799677369610125758950696635980436491 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ1xrrHCkz9TeKqnueyf 000000000000000000000000000000000000000000000000C374BC760D1C6808 10957366083765617198 16jY7qKJTia8qA2HRyCH8ttkDK48ynC1qW 3ee4133d50eed586e09a754d9cea64bd8a8e99cf 359043673694578455355112905559483281244005767631 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxMEeazeLdb25mbUBw9 0000000000000000000000000000000000000000000000009810626608C3422E 15338467798463623790 16jY7qKXvAbWydkoECFnvC4B6tjBrEKWhN 3ee4133d6195ed5c8e3a8d5403e938cf0f43ca84 359043673716713700287800823551761138585853741700 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3QxUe4KUp4Qyb5bTtR 000000000000000000000000000000000000000000000000D4DD2F322E31326E 12018053845398380115 16jY7qKYE8yqVeeo2BQ2GEuxzccLtrXruQ 3ee4133d61f818fbacb8d98050673320fb5d9f8b 359043673717223430130265268114148103754155401099 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYyaM7UjWXwrcJJnbQe2 000000000000000000000000000000000000000000000000A6C8B44C4A7CDE53 15919540175014676452 16jY7qKq9YFpbNv7hE9rAegbnzQxThjb9y 3ee4133d76e8ddd9249feed6118b39026ca024b6 359043673745058134190826254367550950173015286966 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ45uxygmUpuWfLF3Yys 000000000000000000000000000000000000000000000000DCED91719F4F47E4 14960309530126404974 16jY7qL3Lk1F6doZRESLuyL1K5jQ4eqx6A 3ee4133d85ffdce51ba9dc109c8ab8b18507a68a 359043673765115957620901275540833771579488315018 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ2yc1u6yhHBLx5U9MV5 000000000000000000000000000000000000000000000000CF9DB24129134D6E 15163223678565228562 16jY7qL53WH9mqfiGnDVNu4E5cmpaTt2uJ 3ee4133d881b5811bdba44b047547989c0ed3f6e 359043673767917103900228355891329549583627665262 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3DD3WJbyCwwmeMLipV 000000000000000000000000000000000000000000000000D26E9798F2AC2012 17690427578206221414 16jY7qL5MmbBuUPN3pjLgLyCKNCAnMyuPL 3ee4133d887f1bc6b3762a22de2bdca6e91ae941 359043673768435110696216248540087649519577786689 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ68e2XDu8T3FmYF4H64 000000000000000000000000000000000000000000000000F58106278BC17466 14130206010662142352 16jY7qLBfZwny9vSBX1G45XkLFB1jAzqZ7 3ee4133d904d3c7a19809acc9ee368e5ac76fef7 359043673778809983070097333345067472077834354423 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ21xB6s78CZR1uPt36f 000000000000000000000000000000000000000000000000C41893806C9B4190 13355442818363142526 16jY7qLED7wcq3mw3gWq3PqwtnmoZcQYBk 3ee4133d93733783fef9051366cb7392af95097a 359043673782994873710099489007655791452168194426 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ181XK3xsR9gWHUgvez 000000000000000000000000000000000000000000000000B958107BAE93B17E 16943334460982138399 16jY7qLGAvZw8JXVeDe6dKz2mdQfgDLyME 3ee4133d95e0dadc9e7043138d4236e8d8aaf03f 359043673786222603113445584966135603418991620159 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5GYyDTyLjCLEii1f7k 000000000000000000000000000000000000000000000000EB22D0EC3179961F 17625864068125699820 16jY7qLK8rBoKkAEfdQMMZDX2yogfjZinv 3ee4133d998bf7eff1f284ea13c3f0277b2753a3 359043673791098759584668108861628840569146397603 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ64JyPjsWtcpdWfBdvm 000000000000000000000000000000000000000000000000F49BA5FBEFF42EEC 15753519546411984270 16jY7qLKagtc9cypcLj3Ui3QhcQgndY29t 3ee4133d9a191d487e39da0068db61a2a21a7765 359043673791831630906369292845610890857495033701 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3tnQ32KETDrkAXS8b4 000000000000000000000000000000000000000000000000DA9FBE8FCE0F258E 10985036183770518811 16jY7qLU3rWzA5WzpV4BuDW6yh7Xv8wbn4 3ee4133da4940a6c8157683f58ce3924288c90dc 359043673805762180865213802119997989261188829404 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxP6F5Nmpm3UswAqn9p 0000000000000000000000000000000000000000000000009872B0353A74551B 11114163388052541195 16jY7qLXbTXPSciC46crGHs4DqH3EaSdHe 3ee4133da8f71f2df32e42748ecdb7d3e49aa303 359043673811593551211807398525934563932772147971 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxXkMNkX743SmHrYB2P 0000000000000000000000000000000000000000000000009A3D70B750860F0B 12811263834395200302 16jY7qLYUz7iQLiAWpCvSFDmgYB5638mMR 3ee4133daa10955629e2f547c710dff740908428 359043673813054983139446058212669508452736861224 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYzVXVcJ9Fv937ruhXMy 000000000000000000000000000000000000000000000000B1CAC09494EF4B2E
Hello Friend! What software was used for all this?
|
|
|
|
jacky19790729
Jr. Member
Offline
Activity: 82
Merit: 8
|
|
April 01, 2021, 09:28:06 PM |
|
Hello Friend! What software was used for all this?
Google "VanitySearch-1.15.4_bitcrack" and download from GitHub if your GPU can run 440 Mkey / s ~~ (Example: My NVIDIA GTX 1080 ) you will find #64 private key about 200 years ....(25% range scan ) you will find #64 private key about 400 years ....(50% range scan ) 0x0000000000000000000000000000000000000000000000008000000000000000 0x000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFFFF
|
|
|
|
CanalGanheAgora
Newbie
Offline
Activity: 24
Merit: 0
|
|
April 01, 2021, 10:53:11 PM |
|
Hello Friend! What software was used for all this?
Google "VanitySearch-1.15.4_bitcrack" and download from GitHub if your GPU can run 440 Mkey / s ~~ (Example: My NVIDIA GTX 1080 ) you will find #64 private key about 200 years ....(25% range scan ) you will find #64 private key about 400 years ....(50% range scan ) 0x0000000000000000000000000000000000000000000000008000000000000000 0x000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFFFF I am very grateful for your effort, but I already have this program. I wanted to know the one he used.
|
|
|
|
jacky19790729
Jr. Member
Offline
Activity: 82
Merit: 8
|
|
April 02, 2021, 10:25:45 AM Last edit: April 13, 2021, 09:22:43 AM by jacky19790729 |
|
I am very grateful for your effort, but I already have this program. I wanted to know the one he used.
This is it .....VanitySearch-1.15.4_bitcrack........ only edit Vanity.cpp ..... void VanitySearch::output(string addr,string pAddr,string pAddrHex) { ........ You can compile yourself ... use VS 2015 , VS 2017 ~~ and must Learn VC++ this is my code....
void VanitySearch::output(string addr,string pAddr,string pAddrHex) {
#ifdef WIN64 WaitForSingleObject(ghMutex,INFINITE); #else pthread_mutex_lock(&ghMutex); #endif SYSTEMTIME time; GetLocalTime(&time); FILE *f = stdout; bool needToClose = false; bool is_error_output = false;
restart:
std::vector<unsigned char> pubKey; char b58_decode_buf[52] = ""; DecodeBase58(addr, pubKey); for (int i = 0; i < pubKey.size(); i++) { sprintf(b58_decode_buf, "%s%02x", b58_decode_buf, pubKey.data()[i] ); }
is_error_output = false; if (outputFile.length() > 0) { f = fopen(outputFile.c_str(), "a"); if (f == NULL) { printf("Cannot open %s for writing\n", outputFile.c_str()); f = stdout; is_error_output = true; error_file_count = error_file_count + 1; } else { needToClose = true; } } fprintf(f, "\n====<FOUND_KEY_Time1 > %04d-%02d-%02d %02d:%02d =====\n", time.wYear, time.wMonth, time.wDay, time.wHour, time.wMinute); fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n", pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() ); // fprintf(f, "Pub Addr: %s\n", addr.c_str());
if (startPubKeySpecified) {
fprintf(f, "PartialPriv: %s\n", pAddr.c_str());
} else {
switch (searchType) { case P2PKH: fprintf(f, "Priv (WIF): p2pkh:%s\n", pAddr.c_str()); break; case P2SH: fprintf(f, "Priv (WIF): p2wpkh-p2sh:%s\n", pAddr.c_str()); break; case BECH32: fprintf(f, "Priv (WIF): p2wpkh:%s\n", pAddr.c_str()); break; } fprintf(f, "Priv (HEX): 0x%064s\n", pAddrHex.c_str());
}
if(needToClose) fclose(f);
if (is_error_output == true) goto restart;
#ifdef WIN64 ReleaseMutex(ghMutex); #else pthread_mutex_unlock(&ghMutex); #endif
}
my output ... PADDXR, Privkey_HEX, BTC_ADDRESS, Base58_Decode(BTC_ADDRESS), PublicKeyHEX, Priv (WIF), 0xPrivkey_HEX_64byte ====<FOUND_KEY_Time1 > 2021-04-02 18:24:37 ===== PADDXR,EDF6237059D00279,16jY7G96vr6zQd68yMdwzJXeYiDRijFuSB,003ee41121cc283470794755477cab8f62c4b6966ff4501174,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WCerigNr54NA1FNPs,0312158505F3472DD7A4806DB6350771879E5210E171C74422657F5E5FE3EB5C38,0x000000000000000000000000000000000000000000000000EDF6237059D00279,,,,,
====<FOUND_KEY_Time1 > 2021-04-02 18:24:37 ===== PADDXR,EDF6FB2059D00165,16jY7gunDsatmgZRDZZwFZwT4WzCH9JQQG,003ee412b49f36228233abde64497be1d60536933bc09b30e9,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WDaLrWzUaL2xgXhE5,0301023012C8FC600CCA65245C4BCF433AAFC7414D5FD8E45FAB961E07D8824040,0x000000000000000000000000000000000000000000000000EDF6FB2059D00165,,,,,
====<FOUND_KEY_Time1 > 2021-04-02 18:24:37 ===== PADDXR,EDF93CC059D001C7,16jY7aCT2g5UJ932DpYx4zSEFYHc7fk8nu,003ee41247757c9efca4d0d65c9f88d46ed574555e7e0556fa,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WG3aa8Yau3fK2wCsh,02C8C3B1D931B24E7535A43A87C69A8AFB33837B5F1C986CCC933541F0624593EA,0x000000000000000000000000000000000000000000000000EDF93CC059D001C7,,,,,
====<FOUND_KEY_Time1 > 2021-04-02 18:24:37 ===== PADDXR,EDF9552059D00349,16jY7nxkKE7oDt9iYEmJc93NuNeEk2DLd1,003ee413170739eea531117ef58b286bc39bbb259c07e76164,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WG9d9TGPpnygsgXen,029B6E84D314FBB5551FE1D7C0B40889C1C350F9431CC78F2121AF750EECEAE3AD,0x000000000000000000000000000000000000000000000000EDF9552059D00349,,,,,
====<FOUND_KEY_Time1 > 2021-04-02 18:24:37 ===== PADDXR,EDF8766059D00380,16jY7qD5GrEMYBLRAqd8dgKBmFt7UuMJnN,003ee4133b91f089a975274db3ad4bb0e1fd0e66c3d5b9ceeb,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WFCPSAZCE22Rx9yTP,02DA782B51E75C331BA586A44712FBC4E4DC4B34FFC56AA2901B8B46D66F71ADA6,0x000000000000000000000000000000000000000000000000EDF8766059D00380,,,,,
|
|
|
|
WanderingPhilospher
Full Member
Offline
Activity: 1204
Merit: 237
Shooters Shoot...
|
|
April 02, 2021, 12:32:27 PM |
|
I am very grateful for your effort, but I already have this program. I wanted to know the one he used.
This is it .....VanitySearch-1.15.4_bitcrack........ only edit Vanity.cpp ..... void VanitySearch::output(string addr,string pAddr,string pAddrHex) { ........ You can compile yourself ... use VS 2015 , VS 2017 ~~ and must Learn VC++ this is my code.... my output ... PADDXR, Privkey_HEX, BTC_ADDRESS, Base58_Decode(BTC_ADDRESS), PublicKeyHEX, Priv (WIF), 0xPrivkey_HEX_64byte Where is the code that prints the pubkey? fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n", pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() ) I see the other 5 items but not pubkey
|
|
|
|
|