Bitcoin Forum
November 15, 2024, 03:45:04 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 [14] 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 »
  Print  
Author Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED==  (Read 54150 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic. (11 posts by 1+ user deleted.)
Robert_BIT
Newbie
*
Offline Offline

Activity: 33
Merit: 0


View Profile
March 22, 2021, 03:25:46 PM
 #261

This fork seems to be a lot faster with high end GPUs https://github.com/sp-hash/Bitcrack/

SkyDr4k3
Newbie
*
Offline Offline

Activity: 146
Merit: 0


View Profile
March 22, 2021, 07:26:19 PM
 #262

how do i divide (reduce) this period in half or three quarters?

0000000000000000000000000000000000000000000000000000000001000000:
000000000000000000000000000000000000001ffffffffffffffffff


I would like to try to solve the puzzle but i have to reduce it. I would also avoid starting from the first number, I believe many have already tried it from the beginning.

Thank you very much
WanderingPhilospher
Full Member
***
Offline Offline

Activity: 1204
Merit: 237

Shooters Shoot...


View Profile
March 22, 2021, 07:46:27 PM
 #263

how do i divide (reduce) this period in half or three quarters?

0000000000000000000000000000000000000000000000000000000001000000:
000000000000000000000000000000000000001ffffffffffffffffff


I would like to try to solve the puzzle but i have to reduce it. I would also avoid starting from the first number, I believe many have already tried it from the beginning.

Thank you very much
If you are using bitcrack, use the -share option. or use a simple python script to set up the ranges for you.
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 47


View Profile
March 24, 2021, 02:55:16 AM
 #264

Hello,

I have compiled the latest cuBitCrack.exe to work on a Tesla V100 on a Windows server but when I run it I think the speed is to slow for my GPU.

I used this command for testing
Code:
./cuBitCrack.exe -u -c --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A

and it shows
Code:
Tesla V100-SXM2- 342 / 16258MB | 1 target 3.44 MKey/s (434,110,464 total) [00:02:04]

By my calculations it should be at least 40-50 MKey/s with Tesla... Any ideas to improve speed, maybe some commands or do I have to recompile?

ask help tuning from bitcrack thread

remove -u -c

and use -b 40 -t 512

./cuBitCrack.exe -b 40 -t 512 --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A

my friend try Tesla V100 get 140 MKey/s still slow same
zielar (OP)
Full Member
***
Offline Offline

Activity: 282
Merit: 114


View Profile
March 25, 2021, 01:40:16 AM
 #265

Hello,

I have compiled the latest cuBitCrack.exe to work on a Tesla V100 on a Windows server but when I run it I think the speed is to slow for my GPU.

I used this command for testing
Code:
./cuBitCrack.exe -u -c --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A

and it shows
Code:
Tesla V100-SXM2- 342 / 16258MB | 1 target 3.44 MKey/s (434,110,464 total) [00:02:04]

By my calculations it should be at least 40-50 MKey/s with Tesla... Any ideas to improve speed, maybe some commands or do I have to recompile?

ask help tuning from bitcrack thread

remove -u -c

and use -b 40 -t 512

./cuBitCrack.exe -b 40 -t 512 --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A

my friend try Tesla V100 get 140 MKey/s still slow same

try this parameters:
-b 80 -t 512 -p 2800

If you want - you can send me a donation to my BTC wallet address 31hgbukdkehcuxcedchkdbsrygegyefbvd
Robert_BIT
Newbie
*
Offline Offline

Activity: 33
Merit: 0


View Profile
March 25, 2021, 11:28:46 AM
 #266

Hello,

I have compiled the latest cuBitCrack.exe to work on a Tesla V100 on a Windows server but when I run it I think the speed is to slow for my GPU.

I used this command for testing
Code:
./cuBitCrack.exe -u -c --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A

and it shows
Code:
Tesla V100-SXM2- 342 / 16258MB | 1 target 3.44 MKey/s (434,110,464 total) [00:02:04]

By my calculations it should be at least 40-50 MKey/s with Tesla... Any ideas to improve speed, maybe some commands or do I have to recompile?

ask help tuning from bitcrack thread

remove -u -c

and use -b 40 -t 512

./cuBitCrack.exe -b 40 -t 512 --keyspace 517718a91d1993742cc 1GTxA9PsPPd1VtASvqQdXnSJ877bxhEA7A


my friend try Tesla V100 get 140 MKey/s still slow same

try this parameters:
-b 80 -t 512 -p 2800

Thanks guys.

@zielar, so far your settings are the fastest Smiley

-b 80 -t 512 -p 2800



rtxgold
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
March 27, 2021, 03:43:39 AM
 #267

Add this to your collection  Wink between 63 and 65
000000000000000000000000000000000000000000000001A838B13505AF4FE3
1NBPhFPhptwNuhBTbbjtE1qHLTtkt5MLw2
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8VqzJLGd9Uu3

https://i.ibb.co/kXrpFnQ/huir.jpg
sssergy2705
Copper Member
Jr. Member
*
Offline Offline

Activity: 205
Merit: 1


View Profile
March 27, 2021, 03:53:45 AM
 #268

Add this to your collection  Wink between 63 and 65
000000000000000000000000000000000000000000000001A838B13505AF4FE3
1NBPhFPhptwNuhBTbbjtE1qHLTtkt5MLw2
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8VqzJLGd9Uu3



For what? I alone can throw billions of addresses, but why are they empty?
rtxgold
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
March 27, 2021, 04:27:48 AM
 #269

Add this to your collection  Wink between 63 and 65
000000000000000000000000000000000000000000000001A838B13505AF4FE3
1NBPhFPhptwNuhBTbbjtE1qHLTtkt5MLw2
KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8VqzJLGd9Uu3

https://i.ibb.co/kXrpFnQ/huir.jpg

For what? I alone can throw billions of addresses, but why are they empty?



The goal is to find the keys corresponding to the specified addresses, not to make money. The found address is not a specified one but it is helpful for those who are trying to find the base encryption algorithm. The private key is in the specified range and can be useful in generation algorithm study. One is to do math and another is to do brute force, but both work. Good luck
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 47


View Profile
March 27, 2021, 10:22:40 AM
 #270


off topic a little but about bitcoin and puzzle

game age of rust  have 20 BTC Hide on games

https://twitter.com/enjin/status/1373589987824910336

this is just play games or need to solve puzzle on games?
CanalGanheAgora
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
March 28, 2021, 08:26:13 PM
 #271

You can use it to solve 64 puzzles.
https://www.youtube.com/watch?v=dUMaP6hVCo4
BTCGood luck.

Range # 120 and the time it takes to decode it at the moment with my GPU's overbooking is too large for me to start working on it without collision right now. JeanLucPons is busy with other projects (his professional life is more than working on another program) and therefore not active in other programming projects. I will probably start work on # 120 with JeanLucPons in due course, but I don't know when it will happen at the moment.


how long would it take in that interval? ---> 8147ae147ae147ae:828f5c28f5c28f5c
WanderingPhilospher
Full Member
***
Offline Offline

Activity: 1204
Merit: 237

Shooters Shoot...


View Profile
April 01, 2021, 02:44:02 AM
 #272

Update on VanBitCracken Spread:

I've been running 4 days straight (which is abnormally long for me, I usually get bored and mess with range or something) with a 4 card setup. I have checked 2^50.43 keys in those 4 days, all spread out covering the entire 64 bit range.

Results so far:

Code:

16jY7qLJnnQqyCNQCkN22hweBx5sqhVQt2  A60D94B605F6DEED
16jY7qLJnEvB2ResF64UmeHFW9wxaSVTm4  95C4CF22F7E40B09
16jY7qLJnR41HiykutYG8MAzSZKr6C3K9f  9E7EC80F2F18C935
16jY7qLJn8w1VH9tLyAzDtk4siQV8huNk6  9DF0FBD50F6C7A4C
16jY7qLJn6zRW1jAWPxiG9JFW72pADSMot  B8999AF68799CDCF
16jY7qLJnnkjdFXZcPGy2tMjUPQQApEmDc  9B54D134631E5B19
16jY7qLJng2SMHU4SMXPjfawtGCvhHgaSS  B295E10BBE9EC144
16jY7qLJn3UJLMK4nWyLJgpsj7FCUmk1N2  FD01E965E06F7243
16jY7qLJnFpswGCQLBKoStQCoevvQb53G1  986EBB933EEE0962
16jY7qLJnxht5HL2NBywuoC8jK34rz8NJv  9357254130F9270A
16jY7qLJnbwfCSSRXivZnCFG6phBAYvT1b  89F84ED1040B8782
16jY7qLJnikKMRWYNo4U5AMLCSZpb99jTJ  8A500564D1A344A2
16jY7qLJnsEheSTVBw7q7KBfhmF8aT96yu  8A6153AA9FBFE29C
16jY7qLJnrf1AVepwCAZPtXBSnaSyKtVpt  E719146F2C8A64F6
16jY7qLJn6vYeDSgzKpdocFLhudWPsCLCV  FF696CFF78DD33C2
16jY7qLJnkUt7BDW4sjN1gBJu75yQzuA4d  C079D2F2255CB2AB
16jY7qLJnncxUo9uzrBVntYQHEperUMoNm  B817117EA76EA2D2
16jY7qLJnj1na3USbUBXERGMtCMYbkJZSe  D1161C4A0FEDB1A8
16jY7qLJnX9uchnyf26t3QJnsUf78Xdikb  E428E81F902CDEE0
16jY7qLJny2n471fXJxpNiGURGavggRci4  FBBB802CCEAE9E5C
16jY7qLJngSEfpYoYVwEFC7aja8HNkqYb9  C57FC2E3392D09BE
16jY7qLJnAj7kEUY1fXkwLGeWragN42b4q  AC6D1F87FE564205
16jY7qLJnQVihCA2Fcf6dDF9sYpA3TraHM  B2885F30E6063B77
16jY7qLJnHPYTL5daotAZJudvupQ3Wk2kw  8BB203974D48B13C
16jY7qLJnXfwnsfDQsDs72vJJu5XTmPDqJ  8DD4ECD2E4EB2CDD
16jY7qLJnN78hncq2kyRSSPjL49HRAJAwb  CCF2FA5AC3D43641
16jY7qLJnudSwk6jCSLLKzkZWgdydniDAe  FD62B95C5BA1F037
16jY7qLJnF5zbMPjJE4kQCey7cxSeL45ex  90FDF4846B8DCD6F
16jY7qLJn8XpckUucZnqVMKVTjUUXiXaE3  DD924F75C06C3E9E
16jY7qLJnwZafDg2PTxkEprtKjimqBv4wa  E1BDE5D2314C47CA
16jY7qLJn2g5BahcxgNQybjGX8kLeRP3D9  DACF859A61792AD4
16jY7qLJnr1xzcTFJP1GjjG5urgz4fhSC5  B1FB0C0A8F03DB0D

I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC.  But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck.  I'll let it ride for at least another 6-8 hours and see what happens.
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 47


View Profile
April 01, 2021, 05:19:38 AM
 #273


I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC.  But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck.  I'll let it ride for at least another 6-8 hours and see what happens.

I do search by string too

I just try do experiment about look a pattern

problem all puzzle is not create by pattern all is absolute random

problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference

conclusion no pattern

Code:
16454495722324959939	16jY7qK5oW1wnfKRN6uj1ASVdds6aouxDX	3ee4133d41444731cd7beb48b26d3a501fc744ce	359043673673754458109913579780954779489629848782	KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ4hn8W4n7yeaG9rram8	000000000000000000000000000000000000000000000000E45A1CAE075D22C3
15356914462326594163 16jY7qK6wNNFqnR4k1UGUmfv7TFvTrfUbd 3ee4133d42ac12d331b91511632880f5413f9a53 359043673675622622798033731761492103220271487571 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3SCCx52gr4araCbtaR 000000000000000000000000000000000000000000000000D51EB856CD091A73
14084089149906511880 16jY7qK9UeLf4rFYrQsoqQnYbuNpSU9si6 3ee4133d45d08b8400891186f72ccbc24cfdd40b 359043673679799677369610125758950696635980436491 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ1xrrHCkz9TeKqnueyf 000000000000000000000000000000000000000000000000C374BC760D1C6808
10957366083765617198 16jY7qKJTia8qA2HRyCH8ttkDK48ynC1qW 3ee4133d50eed586e09a754d9cea64bd8a8e99cf 359043673694578455355112905559483281244005767631 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxMEeazeLdb25mbUBw9 0000000000000000000000000000000000000000000000009810626608C3422E
15338467798463623790 16jY7qKXvAbWydkoECFnvC4B6tjBrEKWhN 3ee4133d6195ed5c8e3a8d5403e938cf0f43ca84 359043673716713700287800823551761138585853741700 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3QxUe4KUp4Qyb5bTtR 000000000000000000000000000000000000000000000000D4DD2F322E31326E
12018053845398380115 16jY7qKYE8yqVeeo2BQ2GEuxzccLtrXruQ 3ee4133d61f818fbacb8d98050673320fb5d9f8b 359043673717223430130265268114148103754155401099 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYyaM7UjWXwrcJJnbQe2 000000000000000000000000000000000000000000000000A6C8B44C4A7CDE53
15919540175014676452 16jY7qKq9YFpbNv7hE9rAegbnzQxThjb9y 3ee4133d76e8ddd9249feed6118b39026ca024b6 359043673745058134190826254367550950173015286966 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ45uxygmUpuWfLF3Yys 000000000000000000000000000000000000000000000000DCED91719F4F47E4
14960309530126404974 16jY7qL3Lk1F6doZRESLuyL1K5jQ4eqx6A 3ee4133d85ffdce51ba9dc109c8ab8b18507a68a 359043673765115957620901275540833771579488315018 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ2yc1u6yhHBLx5U9MV5 000000000000000000000000000000000000000000000000CF9DB24129134D6E
15163223678565228562 16jY7qL53WH9mqfiGnDVNu4E5cmpaTt2uJ 3ee4133d881b5811bdba44b047547989c0ed3f6e 359043673767917103900228355891329549583627665262 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3DD3WJbyCwwmeMLipV 000000000000000000000000000000000000000000000000D26E9798F2AC2012
17690427578206221414 16jY7qL5MmbBuUPN3pjLgLyCKNCAnMyuPL 3ee4133d887f1bc6b3762a22de2bdca6e91ae941 359043673768435110696216248540087649519577786689 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ68e2XDu8T3FmYF4H64 000000000000000000000000000000000000000000000000F58106278BC17466
14130206010662142352 16jY7qLBfZwny9vSBX1G45XkLFB1jAzqZ7 3ee4133d904d3c7a19809acc9ee368e5ac76fef7 359043673778809983070097333345067472077834354423 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ21xB6s78CZR1uPt36f 000000000000000000000000000000000000000000000000C41893806C9B4190
13355442818363142526 16jY7qLED7wcq3mw3gWq3PqwtnmoZcQYBk 3ee4133d93733783fef9051366cb7392af95097a 359043673782994873710099489007655791452168194426 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ181XK3xsR9gWHUgvez 000000000000000000000000000000000000000000000000B958107BAE93B17E
16943334460982138399 16jY7qLGAvZw8JXVeDe6dKz2mdQfgDLyME 3ee4133d95e0dadc9e7043138d4236e8d8aaf03f 359043673786222603113445584966135603418991620159 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5GYyDTyLjCLEii1f7k 000000000000000000000000000000000000000000000000EB22D0EC3179961F
17625864068125699820 16jY7qLK8rBoKkAEfdQMMZDX2yogfjZinv 3ee4133d998bf7eff1f284ea13c3f0277b2753a3 359043673791098759584668108861628840569146397603 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ64JyPjsWtcpdWfBdvm 000000000000000000000000000000000000000000000000F49BA5FBEFF42EEC
15753519546411984270 16jY7qLKagtc9cypcLj3Ui3QhcQgndY29t 3ee4133d9a191d487e39da0068db61a2a21a7765 359043673791831630906369292845610890857495033701 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3tnQ32KETDrkAXS8b4 000000000000000000000000000000000000000000000000DA9FBE8FCE0F258E
10985036183770518811 16jY7qLU3rWzA5WzpV4BuDW6yh7Xv8wbn4 3ee4133da4940a6c8157683f58ce3924288c90dc 359043673805762180865213802119997989261188829404 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxP6F5Nmpm3UswAqn9p 0000000000000000000000000000000000000000000000009872B0353A74551B
11114163388052541195 16jY7qLXbTXPSciC46crGHs4DqH3EaSdHe 3ee4133da8f71f2df32e42748ecdb7d3e49aa303 359043673811593551211807398525934563932772147971 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxXkMNkX743SmHrYB2P 0000000000000000000000000000000000000000000000009A3D70B750860F0B
12811263834395200302 16jY7qLYUz7iQLiAWpCvSFDmgYB5638mMR 3ee4133daa10955629e2f547c710dff740908428 359043673813054983139446058212669508452736861224 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYzVXVcJ9Fv937ruhXMy 000000000000000000000000000000000000000000000000B1CAC09494EF4B2E

WanderingPhilospher
Full Member
***
Offline Offline

Activity: 1204
Merit: 237

Shooters Shoot...


View Profile
April 01, 2021, 06:27:13 AM
 #274


I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC.  But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck.  I'll let it ride for at least another 6-8 hours and see what happens.

I do search by string too

I just try do experiment about look a pattern

problem all puzzle is not create by pattern all is absolute random

problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference

conclusion no pattern

Correct, there is no pattern, I wasn't/am not looking for a pattern, I am looking for the actual address. I only use string because I have to versus the full address and the program searching for RIPEMD160 (much faster).  Add 2 more characters to your string like mine and see what you come up with. (16jY7qLJn)
fxsniper
Member
**
Offline Offline

Activity: 406
Merit: 47


View Profile
April 01, 2021, 01:24:51 PM
 #275


Correct, there is no pattern, I wasn't/am not looking for a pattern, I am looking for the actual address. I only use string because I have to versus the full address and the program searching for RIPEMD160 (much faster).  Add 2 more characters to your string like mine and see what you come up with. (16jY7qLJn)

I not looking for pattern of address but I try looking to group pattern of hash160
I try to looking for position of key where is it example like if on near  17625864068125699820   I will be using bitcrack scan that zone 2**64 all key

but problem it can be every where on range

no pattern both prefix suffix address

may be really crack it possible do at level bit, who can read and calculate buy bit may be can solve
because both hex and any human read characters just for human read but may be about bits for all
CanalGanheAgora
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
April 01, 2021, 03:14:34 PM
 #276


I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC.  But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck.  I'll let it ride for at least another 6-8 hours and see what happens.

I do search by string too

I just try do experiment about look a pattern

problem all puzzle is not create by pattern all is absolute random

problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference

conclusion no pattern

Code:
16454495722324959939	16jY7qK5oW1wnfKRN6uj1ASVdds6aouxDX	3ee4133d41444731cd7beb48b26d3a501fc744ce	359043673673754458109913579780954779489629848782	KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ4hn8W4n7yeaG9rram8	000000000000000000000000000000000000000000000000E45A1CAE075D22C3
15356914462326594163 16jY7qK6wNNFqnR4k1UGUmfv7TFvTrfUbd 3ee4133d42ac12d331b91511632880f5413f9a53 359043673675622622798033731761492103220271487571 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3SCCx52gr4araCbtaR 000000000000000000000000000000000000000000000000D51EB856CD091A73
14084089149906511880 16jY7qK9UeLf4rFYrQsoqQnYbuNpSU9si6 3ee4133d45d08b8400891186f72ccbc24cfdd40b 359043673679799677369610125758950696635980436491 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ1xrrHCkz9TeKqnueyf 000000000000000000000000000000000000000000000000C374BC760D1C6808
10957366083765617198 16jY7qKJTia8qA2HRyCH8ttkDK48ynC1qW 3ee4133d50eed586e09a754d9cea64bd8a8e99cf 359043673694578455355112905559483281244005767631 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxMEeazeLdb25mbUBw9 0000000000000000000000000000000000000000000000009810626608C3422E
15338467798463623790 16jY7qKXvAbWydkoECFnvC4B6tjBrEKWhN 3ee4133d6195ed5c8e3a8d5403e938cf0f43ca84 359043673716713700287800823551761138585853741700 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3QxUe4KUp4Qyb5bTtR 000000000000000000000000000000000000000000000000D4DD2F322E31326E
12018053845398380115 16jY7qKYE8yqVeeo2BQ2GEuxzccLtrXruQ 3ee4133d61f818fbacb8d98050673320fb5d9f8b 359043673717223430130265268114148103754155401099 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYyaM7UjWXwrcJJnbQe2 000000000000000000000000000000000000000000000000A6C8B44C4A7CDE53
15919540175014676452 16jY7qKq9YFpbNv7hE9rAegbnzQxThjb9y 3ee4133d76e8ddd9249feed6118b39026ca024b6 359043673745058134190826254367550950173015286966 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ45uxygmUpuWfLF3Yys 000000000000000000000000000000000000000000000000DCED91719F4F47E4
14960309530126404974 16jY7qL3Lk1F6doZRESLuyL1K5jQ4eqx6A 3ee4133d85ffdce51ba9dc109c8ab8b18507a68a 359043673765115957620901275540833771579488315018 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ2yc1u6yhHBLx5U9MV5 000000000000000000000000000000000000000000000000CF9DB24129134D6E
15163223678565228562 16jY7qL53WH9mqfiGnDVNu4E5cmpaTt2uJ 3ee4133d881b5811bdba44b047547989c0ed3f6e 359043673767917103900228355891329549583627665262 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3DD3WJbyCwwmeMLipV 000000000000000000000000000000000000000000000000D26E9798F2AC2012
17690427578206221414 16jY7qL5MmbBuUPN3pjLgLyCKNCAnMyuPL 3ee4133d887f1bc6b3762a22de2bdca6e91ae941 359043673768435110696216248540087649519577786689 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ68e2XDu8T3FmYF4H64 000000000000000000000000000000000000000000000000F58106278BC17466
14130206010662142352 16jY7qLBfZwny9vSBX1G45XkLFB1jAzqZ7 3ee4133d904d3c7a19809acc9ee368e5ac76fef7 359043673778809983070097333345067472077834354423 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ21xB6s78CZR1uPt36f 000000000000000000000000000000000000000000000000C41893806C9B4190
13355442818363142526 16jY7qLED7wcq3mw3gWq3PqwtnmoZcQYBk 3ee4133d93733783fef9051366cb7392af95097a 359043673782994873710099489007655791452168194426 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ181XK3xsR9gWHUgvez 000000000000000000000000000000000000000000000000B958107BAE93B17E
16943334460982138399 16jY7qLGAvZw8JXVeDe6dKz2mdQfgDLyME 3ee4133d95e0dadc9e7043138d4236e8d8aaf03f 359043673786222603113445584966135603418991620159 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5GYyDTyLjCLEii1f7k 000000000000000000000000000000000000000000000000EB22D0EC3179961F
17625864068125699820 16jY7qLK8rBoKkAEfdQMMZDX2yogfjZinv 3ee4133d998bf7eff1f284ea13c3f0277b2753a3 359043673791098759584668108861628840569146397603 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ64JyPjsWtcpdWfBdvm 000000000000000000000000000000000000000000000000F49BA5FBEFF42EEC
15753519546411984270 16jY7qLKagtc9cypcLj3Ui3QhcQgndY29t 3ee4133d9a191d487e39da0068db61a2a21a7765 359043673791831630906369292845610890857495033701 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3tnQ32KETDrkAXS8b4 000000000000000000000000000000000000000000000000DA9FBE8FCE0F258E
10985036183770518811 16jY7qLU3rWzA5WzpV4BuDW6yh7Xv8wbn4 3ee4133da4940a6c8157683f58ce3924288c90dc 359043673805762180865213802119997989261188829404 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxP6F5Nmpm3UswAqn9p 0000000000000000000000000000000000000000000000009872B0353A74551B
11114163388052541195 16jY7qLXbTXPSciC46crGHs4DqH3EaSdHe 3ee4133da8f71f2df32e42748ecdb7d3e49aa303 359043673811593551211807398525934563932772147971 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxXkMNkX743SmHrYB2P 0000000000000000000000000000000000000000000000009A3D70B750860F0B
12811263834395200302 16jY7qLYUz7iQLiAWpCvSFDmgYB5638mMR 3ee4133daa10955629e2f547c710dff740908428 359043673813054983139446058212669508452736861224 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYzVXVcJ9Fv937ruhXMy 000000000000000000000000000000000000000000000000B1CAC09494EF4B2E


Hello Friend! What software was used for all this?
jacky19790729
Jr. Member
*
Offline Offline

Activity: 82
Merit: 8


View Profile
April 01, 2021, 09:28:06 PM
 #277

Hello Friend! What software was used for all this?

Google "VanitySearch-1.15.4_bitcrack"   and download from GitHub

if your GPU can run  440 Mkey / s  ~~ (Example:  My NVIDIA GTX 1080 )
you will  find  #64 private key about 200 years ....(25% range scan )
you will  find  #64 private key about 400 years ....(50% range scan )

0x0000000000000000000000000000000000000000000000008000000000000000
0x000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFFFF
CanalGanheAgora
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
April 01, 2021, 10:53:11 PM
 #278

Hello Friend! What software was used for all this?

Google "VanitySearch-1.15.4_bitcrack"   and download from GitHub

if your GPU can run  440 Mkey / s  ~~ (Example:  My NVIDIA GTX 1080 )
you will  find  #64 private key about 200 years ....(25% range scan )
you will  find  #64 private key about 400 years ....(50% range scan )

0x0000000000000000000000000000000000000000000000008000000000000000
0x000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFFFF


I am very grateful for your effort, but I already have this program. I wanted to know the one he used.
jacky19790729
Jr. Member
*
Offline Offline

Activity: 82
Merit: 8


View Profile
April 02, 2021, 10:25:45 AM
Last edit: April 13, 2021, 09:22:43 AM by jacky19790729
 #279

Quote
I am very grateful for your effort, but I already have this program. I wanted to know the one he used.

This is it .....VanitySearch-1.15.4_bitcrack........ only edit Vanity.cpp  .....

void VanitySearch::output(string addr,string pAddr,string pAddrHex) { ........

You can compile yourself ... use VS 2015 ,  VS 2017 ~~ and must Learn VC++
this is my code....

Code:


void VanitySearch::output(string addr,string pAddr,string pAddrHex) {

#ifdef WIN64
   WaitForSingleObject(ghMutex,INFINITE);
#else
  pthread_mutex_lock(&ghMutex);
#endif
  
  SYSTEMTIME time;
  GetLocalTime(&time);
  
  FILE *f = stdout;
  bool needToClose = false;
  bool is_error_output = false;

restart:

  std::vector<unsigned char> pubKey;
  char b58_decode_buf[52] = "";
  DecodeBase58(addr, pubKey);
  for (int i = 0; i < pubKey.size(); i++) {
 sprintf(b58_decode_buf, "%s%02x", b58_decode_buf, pubKey.data()[i]  );
  }

  is_error_output = false;
  if (outputFile.length() > 0)
  {
    f = fopen(outputFile.c_str(), "a");
    if (f == NULL) {
      printf("Cannot open %s for writing\n", outputFile.c_str());
      f = stdout;
 is_error_output = true;
 error_file_count = error_file_count + 1;
    } else {
      needToClose = true;
    }
  }
  fprintf(f, "\n====<FOUND_KEY_Time1 >  %04d-%02d-%02d %02d:%02d =====\n", time.wYear, time.wMonth, time.wDay, time.wHour, time.wMinute);
  fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() );
//  fprintf(f, "Pub Addr: %s\n", addr.c_str());

  if (startPubKeySpecified) {

    fprintf(f, "PartialPriv: %s\n", pAddr.c_str());

  } else {

    switch (searchType)
{
    case P2PKH:
      fprintf(f, "Priv (WIF): p2pkh:%s\n", pAddr.c_str());
      break;
    case P2SH:
      fprintf(f, "Priv (WIF): p2wpkh-p2sh:%s\n", pAddr.c_str());
      break;
    case BECH32:
      fprintf(f, "Priv (WIF): p2wpkh:%s\n", pAddr.c_str());
      break;
    }
    fprintf(f, "Priv (HEX): 0x%064s\n", pAddrHex.c_str());

  }

  if(needToClose)
    fclose(f);

  if (is_error_output == true) goto restart;

#ifdef WIN64
  ReleaseMutex(ghMutex);
#else
  pthread_mutex_unlock(&ghMutex);
#endif

}


my output ...

PADDXR,
Privkey_HEX,
BTC_ADDRESS,
Base58_Decode(BTC_ADDRESS),
PublicKeyHEX,
Priv (WIF),
0xPrivkey_HEX_64byte

Code:
====<FOUND_KEY_Time1 >  2021-04-02 18:24:37 =====
PADDXR,EDF6237059D00279,16jY7G96vr6zQd68yMdwzJXeYiDRijFuSB,003ee41121cc283470794755477cab8f62c4b6966ff4501174,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WCerigNr54NA1FNPs,0312158505F3472DD7A4806DB6350771879E5210E171C74422657F5E5FE3EB5C38,0x000000000000000000000000000000000000000000000000EDF6237059D00279,,,,,

====<FOUND_KEY_Time1 >  2021-04-02 18:24:37 =====
PADDXR,EDF6FB2059D00165,16jY7gunDsatmgZRDZZwFZwT4WzCH9JQQG,003ee412b49f36228233abde64497be1d60536933bc09b30e9,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WDaLrWzUaL2xgXhE5,0301023012C8FC600CCA65245C4BCF433AAFC7414D5FD8E45FAB961E07D8824040,0x000000000000000000000000000000000000000000000000EDF6FB2059D00165,,,,,

====<FOUND_KEY_Time1 >  2021-04-02 18:24:37 =====
PADDXR,EDF93CC059D001C7,16jY7aCT2g5UJ932DpYx4zSEFYHc7fk8nu,003ee41247757c9efca4d0d65c9f88d46ed574555e7e0556fa,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WG3aa8Yau3fK2wCsh,02C8C3B1D931B24E7535A43A87C69A8AFB33837B5F1C986CCC933541F0624593EA,0x000000000000000000000000000000000000000000000000EDF93CC059D001C7,,,,,

====<FOUND_KEY_Time1 >  2021-04-02 18:24:37 =====
PADDXR,EDF9552059D00349,16jY7nxkKE7oDt9iYEmJc93NuNeEk2DLd1,003ee413170739eea531117ef58b286bc39bbb259c07e76164,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WG9d9TGPpnygsgXen,029B6E84D314FBB5551FE1D7C0B40889C1C350F9431CC78F2121AF750EECEAE3AD,0x000000000000000000000000000000000000000000000000EDF9552059D00349,,,,,

====<FOUND_KEY_Time1 >  2021-04-02 18:24:37 =====
PADDXR,EDF8766059D00380,16jY7qD5GrEMYBLRAqd8dgKBmFt7UuMJnN,003ee4133b91f089a975274db3ad4bb0e1fd0e66c3d5b9ceeb,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WFCPSAZCE22Rx9yTP,02DA782B51E75C331BA586A44712FBC4E4DC4B34FFC56AA2901B8B46D66F71ADA6,0x000000000000000000000000000000000000000000000000EDF8766059D00380,,,,,

WanderingPhilospher
Full Member
***
Offline Offline

Activity: 1204
Merit: 237

Shooters Shoot...


View Profile
April 02, 2021, 12:32:27 PM
 #280

Quote
I am very grateful for your effort, but I already have this program. I wanted to know the one he used.

This is it .....VanitySearch-1.15.4_bitcrack........ only edit Vanity.cpp  .....

void VanitySearch::output(string addr,string pAddr,string pAddrHex) { ........

You can compile yourself ... use VS 2015 ,  VS 2017 ~~ and must Learn VC++
this is my code....




my output ...

PADDXR,
Privkey_HEX,
BTC_ADDRESS,
Base58_Decode(BTC_ADDRESS),
PublicKeyHEX,
Priv (WIF),
0xPrivkey_HEX_64byte



Where is the code that prints the pubkey?
Code:
fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() )

I see the other 5 items but not pubkey
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 [14] 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!