as was doing my try to find the key,
the code i had showed this, nothing hardcoded for that address in the code btw but still there,
==================================================================
VERIFY — Scale-Reduction Puzzle (community example)
==================================================================
k = Scale * pK (mod n) Scale = 4*2^192 + 3*2^128 + 2*2^64 + 1
k in four 64-bit lanes:
k[255:192]=4*pK k[191:128]=3*pK k[127:064]=2*pK k[063:000]=1*pK
Community member's approach:
1. Compute Scale and its modular inverse on secp256k1 order
2. Q' = inv(Scale)*PubKey => Q' = pK*G (standard 1D DLP)
3. BSGS on Q' in ~[2^63, 2^64) range — solved in 2 min on a PC
4. Reconstruct full key: k = Scale*pK mod n
pK = 0x3380374721080fff (62 bits)
k = ce00dd1c84203ffc9a80a5d563182ffd67006e8e42101ffe3380374721080fff
Address = 1PGRtg6XjiYSB1VJAhsqLQc6hQeBqFGVPD
inv(Scale)*PubKey == pK*G : VERIFIED
Lane check:
4*pK = ce00dd1c84203ffc 3*pK = 9a80a5d563182ffd
2*pK = 67006e8e42101ffe 1*pK = 3380374721080fff
Combined = ce00dd1c84203ffc9a80a5d563182ffd67006e8e42101ffe3380374721080fff
k (mod n)= ce00dd1c84203ffc9a80a5d563182ffd67006e8e42101ffe3380374721080fff match
================================================================== saw later it was puzzle 5's address, weird or normal.