Search content
Sort by

Showing 20 of 30 results by Frequence
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 28/06/2025, 15:38:43 UTC
This puzzle is very strange. If it's for measuring the world's brute forcing capacity, 161-256 are just a waste (RIPEMD160 entropy is filled by 160, and by all of P2PKH Bitcoin). The puzzle creator could improve the puzzle's utility without bringing in any extra funds from outside - just spend 161-256 across to the unsolved portion 51-160, and roughly treble the puzzle's content density.

If on the other hand there's a pattern to find... well... that's awfully open-ended... can we have a hint or two? Cheesy

I am the creator.

You are quite right, 161-256 are silly.  I honestly just did not think of this.  What is especially embarrassing, is this did not occur to me once, in two years.  By way of excuse, I was not really thinking much about the puzzle at all.

I will make up for two years of stupidity.  I will spend from 161-256 to the unsolved parts, as you suggest.  In addition, I intend to add further funds.  My aim is to boost the density by a factor of 10, from 0.001*length(key) to 0.01*length(key).  Probably in the next few weeks.  At any rate, when I next have an extended period of quiet and calm, to construct the new transaction carefully.

A few words about the puzzle.  There is no pattern.  It is just consecutive keys from a deterministic wallet (masked with leading 000...0001 to set difficulty).  It is simply a crude measuring instrument, of the cracking strength of the community.

Finally, I wish to express appreciation of the efforts of all developers of new cracking tools and technology.  The "large bitcoin collider" is especially innovative and interesting!

Can you match the creator of riddles? My question is that the puzzle range is now very large and almost impossible with the current search power, do you have potential tips or tips for us? While the purpose of the creators of riddles may be something other than our thinking, but if the puzzle guidance is provided, more people will be able to solve the rest of the puzzles and this is called the puzzle search, I didn't understand the reason for their name Huh? The puzzle is usually done by laying pieces of answers or solutions, and in these cases bitcoin puzzles are the same? That we can tell that puzzle Huh?



You're literally spamming this thread.
The creator is here to test current hardware performance and push its limits.
Within the next four years or even sooner, puzzle 71 will be a thing of the past.
The creator's goal is to benchmark hardware, not to hand out free keys so please stop the noise and focus on solving the puzzle !!!
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 26/06/2025, 12:57:11 UTC
he wants to test if his bot is faster than other bots i guess

Exactly.
Other participants also can do it.
And this is free for them, instead of me.

Bro, that doesn’t make any sense. Bots are fast, use the 100 bit range instead.
We have done test and I can confirm that will be done within seconds .. increase the range if you want real fun

Again:( Miners Thanks bro )
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 25/06/2025, 16:44:49 UTC
and kowalla/Bram disappeared in...does anyone know about him? he deleted his profile on X too.

How to safely withdraw BTC from puzzle wallets (71 included)

Hey everyone, since I’ve seen more interest lately around the puzzles and some people getting sniped, I thought I’d post a quick guide on how to do it right. Especially since puzzle 71 is very close to being found and it has over 7 BTC in it.

This method works for any puzzle where the private key is in a low range and you're able to recover it. If you just found the key and you're planning to import it in Electrum and click send... stop right now and read.

Why you shouldn't use the mempool

Once you broadcast a transaction to the public mempool (even with a high fee), the pubKey becomes visible. That means anyone monitoring the network can instantly start brute-forcing the private key and if the range is small (like puzzle 71), they'll find it in seconds. Even if you broadcast first, someone can RBF you with a higher fee and steal it.

It already happened with multiple puzzles. Some bots are running 24/7 and replacing transactions 50+ times until they win.

Correct way to withdraw

1. Generate a secure BTC address

Don’t send funds to an old or reused address. Use a new address from a wallet you control. Sparrow wallet is good, Electrum works too, or hardware wallet. Segwit is fine. Save the seed and verify it works.

2. Craft the transaction offline

Import the puzzle private key into an offline wallet or use command-line tools (bitcoin-tx or Sparrow in offline mode). Build a transaction that sends the funds to your new BTC address.

Set a high fee. I’d recommend something like 30k to 100k sats depending on size. If the TX is 300 vbytes, go with 300 sat/vB or more. Don’t cheap out on this, it’s less than $50 to secure over $700k worth of BTC.

Export the signed raw transaction as HEX. Do not broadcast it yet.

3. Use a miner relay (not public broadcast)

Now go to: https://slipstream.mara.com/

This is a private relay to the Marathon mining pool. Paste your signed TX hex and submit it. That way, your transaction goes directly to the miner and isn’t seen by the public mempool or sniping bots.

Once it’s mined, the BTC will be in your address. At that point, it’s too late for anyone to do anything the UTXO is already spent.

What if I don’t use slipstream?

Then your transaction will show up in the mempool, bots will see it, and if you’re not using RBF defense or an aggressive strategy, they can and will steal it. You’ll see your TX dropped and someone else’s version with a higher fee getting confirmed.

If you’re not 100% sure how to use slipstream or build a raw TX, ask before you risk it.

Puzzle 71 warning

We’re almost there. Someone will solve 71 soon, maybe already has. If you’re the one who gets the key, please don’t lose the funds by broadcasting it naively. Follow the steps above and you’ll be fine.

Happy hunting and stay safe.

             Dear  sir why do the attackers wait for someone to send transaction ? does sending on our wallet can show them what the hex for the address ? does the hex is shown on the mempool ? or what is the reason for using the spilstrem?  I mean if they have such capability why don't they scan by them selfs and take the funds ?

Attackers are waiting for someone to send funds so they can use the exposed public key and reverse-engineer the private key. Since the key range is only 71 bits, it becomes easy for them to find the key within seconds.

Regarding Marapool, you can submit the transaction and it will be confirmed without appearing in the mempool. After 1–2 blocks, the transaction will be broadcasted. This method prevents anyone from seeing the public key in the hex.

Kowala is still active on X and last time told me...
"
..............
I would 100% work on 71 if it was profitable. But at current GPU prices and BTC price, sadly it’s not Smiley

"
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 25/06/2025, 13:14:19 UTC
How to safely withdraw BTC from puzzle wallets (71 included)

Hey everyone, since I’ve seen more interest lately around the puzzles and some people getting sniped, I thought I’d post a quick guide on how to do it right. Especially since puzzle 71 is very close to being found and it has over 7 BTC in it.

This method works for any puzzle where the private key is in a low range and you're able to recover it. If you just found the key and you're planning to import it in Electrum and click send... stop right now and read.

Why you shouldn't use the mempool

Once you broadcast a transaction to the public mempool (even with a high fee), the pubKey becomes visible. That means anyone monitoring the network can instantly start brute-forcing the private key and if the range is small (like puzzle 71), they'll find it in seconds. Even if you broadcast first, someone can RBF you with a higher fee and steal it.

It already happened with multiple puzzles. Some bots are running 24/7 and replacing transactions 50+ times until they win.

Correct way to withdraw

1. Generate a secure BTC address

Don’t send funds to an old or reused address. Use a new address from a wallet you control. Sparrow wallet is good, Electrum works too, or hardware wallet. Segwit is fine. Save the seed and verify it works.

2. Craft the transaction offline

Import the puzzle private key into an offline wallet or use command-line tools (bitcoin-tx or Sparrow in offline mode). Build a transaction that sends the funds to your new BTC address.

Set a high fee. I’d recommend something like 30k to 100k sats depending on size. If the TX is 300 vbytes, go with 300 sat/vB or more. Don’t cheap out on this, it’s less than $50 to secure over $700k worth of BTC.

Export the signed raw transaction as HEX. Do not broadcast it yet.

3. Use a miner relay (not public broadcast)

Now go to: https://slipstream.mara.com/

This is a private relay to the Marathon mining pool. Paste your signed TX hex and submit it. That way, your transaction goes directly to the miner and isn’t seen by the public mempool or sniping bots.

Once it’s mined, the BTC will be in your address. At that point, it’s too late for anyone to do anything the UTXO is already spent.

What if I don’t use slipstream?

Then your transaction will show up in the mempool, bots will see it, and if you’re not using RBF defense or an aggressive strategy, they can and will steal it. You’ll see your TX dropped and someone else’s version with a higher fee getting confirmed.

If you’re not 100% sure how to use slipstream or build a raw TX, ask before you risk it.

Puzzle 71 warning

We’re almost there. Someone will solve 71 soon, maybe already has. If you’re the one who gets the key, please don’t lose the funds by broadcasting it naively. Follow the steps above and you’ll be fine.

Happy hunting and stay safe.

              Dear  sir why do the attackers wait for someone to send transaction ? does sending on our wallet can show them what the hex for the address ? does the hex is shown on the mempool ? or what is the reason for using the spilstrem?  I mean if they have such capability why don't they scan by them selfs and take the funds ?

Attackers are waiting for someone to send funds so they can use the exposed public key and reverse-engineer the private key. Since the key range is only 71 bits, it becomes easy for them to find the key within seconds.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 24/06/2025, 13:25:38 UTC
what is the most basic puzzle i can start with?

You can start with 71, but please be aware that ALL PUZZLES UNTIL ABOUT 86-87 SHOULD BE WITHDRAWN WITHOUT USING PUBLIC BTC MEMPOOL. USE SLIPSTREAM SERVICE OF MARA POOL TO WITHDRAW SUCCESSFULLY.

And what's the plan for your $100 challenge? Gonna play it with MaraPool's slipstream, or rolling the dice with a regular mempool transaction?

Mempool of course. Or it will be no challenge if use slipstream.

ps: Waiting for 13.00 UTC. Also I'll place first initial tx just after block mined to have more time for fun Smiley

Burned 100$ in fee

Miners = Thank you bro
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 19/06/2025, 18:22:53 UTC

Okay, can you give an example?!
You can see these addresses from 2011, which were translated 13 years later.

1L8SXqb31Ry2dKPRaY19xddo9fcsvCKVYN
1EySSGtSVitbMZSQmhNobvTEPdmGSwpsjA

And these are wallets from the very beginning of 2009, when they were still giving 50 bitcoins for a block.

1CGT3Ywaa2upJfWtUtbXonDPNTfZPWqzmA
1MBBJBFEaYKHFZAeV7hQ7DWdu3aZktjzFH
13J8FkimCLQ2EnP1xRm7yHhpaZQa9H4p8E
18E5d2wQdAfutcXgziHZR71izLRyjSzGSX
1C4rE41Kox3jZbdJT9yatyh4H2fMxP8qmD

I doubt that a person found his software after 15 years. It is impossible. And considering that these are the initial blocks and possibly the addresses of Satoshi himself, but not for sure. But it is a huge blunder to transfer funds from these addresses.
I myself mined in 2009, at the very beginning through the satoshi application. But at that time I was just playing around, and the reward for each block was on a new address, save a private key or see at that time there was no such function in the application. Or maybe I didn't know, only wallet.dat was for saving your funds.
At that time I had 2 servers at home, I kept my websites on one, and launched pirated game servers on the other. And a friend told me about bitcoin, I don’t remember how much I mined, the software worked for a month, probably 1000btc and that was it. I just deleted the application later, I didn’t know what to do with these coins.

You can search more precisely and find even more addresses.


It's always possible (and even happened) that old software had bugs like bad RNG, making exploits viable more or less. More probable than secp being broken in secret (though not excluded).
I doubt it. From those addresses that transferred 50 btc, all this stuff won't work. Only if there is a vulnerability in that original application. There were no others at that time.

Yes, it looks like someone is moving funds from old addresses, likely related to keys that were generated earlier using the initial version of BC Core.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 19/06/2025, 15:37:40 UTC
While everyone is trying to brute force this puzzle. Some people have already hacked Bitcoin itself, or rather secp, otherwise some transactions cannot be explained. Of course, the one who hacks the system itself will not say anything about it, otherwise his life will be in danger, a lot of money is kept by influential people and also the black market.
One thing is certain, old addresses from 2009-2010 have been active for some time now. And transfers to exchanges and other addresses are made from them. It is logical that if you have found a vulnerability, it is better to use old wallets, because in this case, few will be able to confirm the legitimacy of these coins, because they have long lost the keys.

Okay, can you give an example?!
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 19/06/2025, 15:22:19 UTC
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 16/06/2025, 11:57:35 UTC
Great speed but dont have range Start and End.

I have modified FixedPaul VanitySearch, which allow custom start:end range and add new totally random mode without any sequential approach, but since i also create my own version of range slicing code, i use sequential in this process :

Code:
PS C:\Users\Asus\Desktop\Vanbitxx> ./x64/Release/VanitySearch.exe -gpuId 0 -f newrx.txt -seq 1PWo3JeB

VanitySearch-Bitcrack v2.2 by FixedPaul

[*] Processing range file: newrx.txt
[*] Found range file at: C:\Users\Asus\Desktop\Vanbitxx\newrx.txt
[*] Loading ranges from file: C:\Users\Asus\Desktop\Vanbitxx\newrx.txt
[*] File size: 16669574 bytes
[*] Parsed 438673 non-empty lines
[*] Found 438673 ranges in file
[*] Successfully loaded 438673 ranges into cache

Range file: C:\Users\Asus\Desktop\Vanbitxx\newrx.txt
Range: 40BD1588A9B58ADC43 -> 40BD1588AC0996C042 (Keys: 10000000000, Remaining: 438672)

Initial range from file:
Start: 40BD1588A9B58ADC43
End: 40BD1588AC0996C042
Next: 40BD1588A9B58ADC43
Sequential Mode Enabled !
Search: 1PWo3JeB [Compressed]
Current task START time: Sun Jun 15 20:58:00 2025
GPU: GPU #0 NVIDIA GeForce RTX 2050 (16x128 cores) Grid(2048x256)
Starting keys set in 0.21 seconds

Range: 465C3F524916AE3D6E -> 465C3F524B6ABA216D (Keys: 10000000000, Remaining: 438561) - Speed: 564.2 [MK/s] - Found: 0
Public Addr: 1PWo3JeBFpmV6hk6gyvUHRZ5yMtLSySU8p
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qzbxieRo41BuDkkstQDr
Priv (HEX): 0x0000000000000000000000000000000000000000000000465C3F524B26D02B36

Range: 4AD8C8A8E1D4D5FB6D -> 4AD8C8A8E428E1DF6C (Keys: 10000000000, Remaining: 438449) - Speed: 564.0 [MK/s] - Found: 1
Public Addr: 1PWo3JeBHpRhh6uasKKNBSVFcREHB5X9P8
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3r2FdEJec4RhDmzHm8GkV
Priv (HEX): 0x00000000000000000000000000000000000000000000004AD8C8A8E2772B6382

Range: 45B791FF293F7EC654 -> 45B791FF2B938AAA53 (Keys: 10000000000, Remaining: 438272) - Speed: 564.7 [MK/s] - Found: 2

Can you please upload this version ? Thanks
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 08/06/2025, 22:33:23 UTC
Let’s bring this thread back to life. I want to share something it might be helpful, or it might not but hopefully someone will find the key. Don’t forget to drop a tip if you do.

I’ve studied this puzzle for years, but with the recent surge in interest, it’s become more intriguing.

To save you time, here’s the basic rule I’m working with:

A = 1, B = 2, C = 3, D = 4, E = 5, F = 6, and 0 = F
The letter S stands for "reverse" or "swap".

I started analyzing the keys to find potential patterns. Before diving too deep, I focused on predicting what the key might start with.

I filtered all key ranges (screenshot: https://prnt.sc/T28HD6H65QAZ) and pulled out the first digits. Here’s what I found:

Code:




















You’ll notice that two digits repeat frequently.

I used the following prompt with multiple AI tools to analyze this:

Quote
Given a numerical sequence with missing values represented by X or Y, analyze the sequence using a sliding window approach (groups of 3). Look for repeated trios, rising or falling trends, plateaus, or cycles. Compare the numbers before and after missing variables with similar known patterns. Use logic to infer consistent values.

To test it, I masked a known value as X and asked the AI to predict it. It consistently predicted X correctly. For Y, the AI always returned Y = 4, regardless of the user or session.

You can try this yourself and you’ll likely get the same: Y = 4.

Assuming Y = 4, I went further and analyzed the first four characters from this list:
Screenshot: https://prnt.sc/rWWTgdLjXsAU

I noticed something interesting when comparing keys that start with 6 versus those starting with 4:

Code:
Original:
68F3 
6AC3 
6BD3 
6CD6 
6ABE 
60F4 

Modified:
4AED 
4B5F 
4C5C 


As shown in the screenshot, I swapped the starting digit from 6 to 4 to observe the pattern. When applying some of the known parameters, certain keys started generating results. This suggests that modifying just the first four digits can have an impact so rather than brute-forcing blindly, it's more efficient to target these specific prefixes.

It’s odd that just a +1 or -1 change can yield another viable prefix.

I’m currently low on budget, but I plan to explore this more deeply. The way 69 was solved still feels suspicious to me, but I haven’t had time to fully investigate.

So far, I’ve focused on patterns like 4BC or 4AD. Remember the character values: A = 1, B = 2, ..., F = 6. This means possibilities like 4B3 or 4A4 are worth considering.

Don’t take any of this as gospel but if you're going to brute force, it’s smarter to narrow the search space and look for logical patterns instead of going in blind.

Keep in mind, this puzzle was created back in 2015, when Bitcoin was priced around $200 to $300.

Some people assume that because the current balance is high, the key must be near the end of the range. But remember the key for 69 was found near the beginning. So don’t be misled by the high balance into thinking it has to be at the end.

This is just my personal view, but I believe the key lies within the first 25% of the range. There had to be some kind of reset.

Hopefully, someone finds the key.

BTC: 123456789432PgWu32w4fUA8qvL4WxRvHj

Best of luck,
Regards



Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 06/06/2025, 14:14:26 UTC
Then why waste time doing it?
I was thinking of raising up your inexistent merit from zero to 1 for "I am no longer sharing any ideas or thoughts here.". That's a good decision after 233 zero-valued posts! But then I remembered how it's impossible for you to ever admit your mistakes.

Hope the other 135 people are aware that their fascist leader can't count bits properly, while calling everyone else (who haven't yet ignored him) as AI disfunctional idiots.

Aren't you? An old boy trying to apologize. lol

Are you talking to me? Have you improved yourself that much? Smiley) Were you using artificial intelligence 5.0?

Now your lover is waiting. (GPT) Don't answer me without asking him. Cheesy

Attention other friends.!!

Your knowledge about prefixes is really weak. I recommend you to do research on how to improve this.
To those who don't believe my idea here, I say HODRİ MEYDAN.
Does anyone have more and closer h160s than me?
I know the answer, no.

I am writing the ones that are close for example. Compare your own h160.

f6f5431d25bbf7ebf2d652ebdd4706567468968b
f6f5431d25bbf7c73fc6ba422e2c9384944e01e5
f6f5431d25bbf7c2c1a542f87f2b4c6fcd994ce9
f6f5431d25bbf7383f07a040f6089a59d4d725e2
f6f5431d25bbf71fe311d2d4b68fe67f315466a8
f6f5431d25bbf702bafee0413954bfe84354863a
...

I'm not here to criticize anyone, and sure, anything is possible. But have you actually tested your method on low bit puzzles, or are you just making an attempt?!! Honestlyy, it doesn't seem to make much sense, since it's essentially the same as searching for the key to the puzzle. Try it on low bit puzzles and come back with the results (prove your point of view). I hope you do find something.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 06/06/2025, 01:49:40 UTC
I noticed that some people in the group are searching for prefixes
You are not missing anything. They just try to be creative, that's all.
As you mentioned, it does not make sense. But if they are having fun with it, let it be.
So basically, this is like a jumping game, but the jumps are random, not fixed. If the range were predictable, it would definitely be a game changer. As it stands, though, it seems like a waste of time.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 05/06/2025, 20:53:26 UTC
ok zahid you have the link wanna test it, will test thoroughly

He’s not contributing anything meaningful and is actually spamming the threads this isn’t the first time.
In an indirect way, he's trying to push people to buy ,,, Every now and then, he posts something like this.
I’m not here to agree or disagree with what he’s doing, but it’s important to point out his intention: marketing.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 05/06/2025, 14:33:42 UTC
Does anyone know who the author of the puzzle is?JPL?…

I know who the creator is.
- He cannot be contacted digitally in any way. (But he can reach you.)
- Someone who likes to travel in the mountains, go camping, etc.
- One of the first people to introduce Bitcoin in the EUROPE region and in his own country during the early days of Bitcoin.
- A person who has some interesting comments about the creator of Bitcoin (SATOSHI) and gives clues about who the Satoshi group is.
- The head of the Fund donations who helps people in some regions with the help of 6 associations.
- Finally, a person who has more than 28500 BTC detected in the total of his accounts.
- Just the Last Hint - A citizen of a country you cannot guess (Europe)

...


The creator has already posted a comment about this puzzle  Smiley


It's not enough. I need his exact address. Phone number etc.  Smiley

You're more likely to find the puzzle keys than to get in touch with him, lol No one wants to become a target.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 05/06/2025, 14:09:33 UTC
Does anyone know who the author of the puzzle is?JPL?…

I know who the creator is.
- He cannot be contacted digitally in any way. (But he can reach you.)
- Someone who likes to travel in the mountains, go camping, etc.
- One of the first people to introduce Bitcoin in the EUROPE region and in his own country during the early days of Bitcoin.
- A person who has some interesting comments about the creator of Bitcoin (SATOSHI) and gives clues about who the Satoshi group is.
- The head of the Fund donations who helps people in some regions with the help of 6 associations.
- Finally, a person who has more than 28500 BTC detected in the total of his accounts.
- Just the Last Hint - A citizen of a country you cannot guess (Europe)

...


The creator has already posted a comment about this puzzle  Smiley
Post
Topic
Board Bitcoin Discussion
Merits 1 from 1 user
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 04/06/2025, 00:49:30 UTC
⭐ Merited by bitstonps (1)
3 seconds on PYTHON! PK found.

Code:
import math, time, sys, os
from gmpy2 import mpz, powmod, invert, jacobi
import xxhash  
from sortedcontainers import SortedDict

# Clear screen and initialize
os.system("cls||clear")
t = time.ctime()
sys.stdout.write(f"\033[?25l\033[01;33m[+] BSGS: {t}\n")
sys.stdout.flush()

# Elliptic Curve Parameters (secp256k1)
modulo = mpz(0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F)
order = mpz(0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141)
Gx = mpz(0x79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798)
Gy = mpz(0x483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8)
PG = (Gx, Gy)

# Point Addition on Elliptic Curve
def add(P, Q):
    if P == (0, 0):
        return Q
    if Q == (0, 0):
        return P
    Px, Py = P
    Qx, Qy = Q
    if Px == Qx:
        if Py == Qy:
            inv_2Py = invert((Py << 1) % modulo, modulo)
            m = (3 * Px * Px * inv_2Py) % modulo
        else:
            return (0, 0)
    else:
        inv_diff_x = invert(Qx - Px, modulo)
        m = ((Qy - Py) * inv_diff_x) % modulo
    x = (m * m - Px - Qx) % modulo
    y = (m * (Px - x) - Py) % modulo
    return (x, y)

# Scalar Multiplication on Elliptic Curve
def mul(k, P=PG):
    R0, R1 = (0, 0), P
    for i in reversed(range(k.bit_length())):
        if (k >> i) & 1:
            R0, R1 = add(R0, R1), add(R1, R1)
        else:
            R1, R0 = add(R0, R1), add(R0, R0)
    return R0

# Point Subtraction
def point_subtraction(P, Q):
    Q_neg = (Q[0], (-Q[1]) % modulo)
    return add(P, Q_neg)

# Compute Y from X using curve equation
def X2Y(X, y_parity, p=modulo):
    X3_7 = (pow(X, 3, p) + 7) % p
    if jacobi(X3_7, p) != 1:
        return None
    Y = powmod(X3_7, (p + 1) >> 2, p)
    return Y if (Y & 1) == y_parity else (p - Y)

# Convert point to compressed public key
def point_to_cpub(point):
    x, y = point
    y_parity = y & 1
    prefix = '02' if y_parity == 0 else '03'
    compressed_pubkey = prefix + format(x, '064x')
    return compressed_pubkey

# Hash a compressed public key using xxhash and store only the first 8 characters
def hash_cpub(cpub):
    return xxhash.xxh64(cpub.encode()).hexdigest()[:8]

# Main Script
if __name__ == "__main__":
    # Puzzle Parameters
    puzzle = 40
    start_range, end_range = 2**(puzzle-1), (2**puzzle) - 1
    puzzle_pubkey = '03a2efa402fd5268400c77c20e574ba86409ededee7c4020e4b9f0edbee53de0d4'

    # Parse Public Key
    if len(puzzle_pubkey) != 66:
        print("[error] Public key length invalid!")
        sys.exit(1)
    prefix = puzzle_pubkey[:2]
    X = mpz(int(puzzle_pubkey[2:], 16))
    y_parity = int(prefix) - 2
    Y = X2Y(X, y_parity)
    if Y is None:
        print("[error] Invalid compressed public key!")
        sys.exit(1)
    P = (X, Y)  # Uncompressed public key

    # Precompute m and mP for BSGS
    m = int(math.floor(math.sqrt(end_range - start_range)))
    m_P = mul(m)

    # Create Baby Table with SortedDict
    print('[+] Creating babyTable...')
    baby_table = SortedDict()  
    Ps = (0, 0)  # Start with the point at infinity
    for i in range(m + 1):
        cpub = point_to_cpub(Ps)
        cpub_hash = hash_cpub(cpub)  # Use xxhash and store only 8 characters
        baby_table[cpub_hash] = i  # Store the hash as the key and index as the value
        Ps = add(Ps, PG)  # Incrementally add PG

    # BSGS Search
    print('[+] BSGS Search in progress')
    S = point_subtraction(P, mul(start_range))
    step = 0
    st = time.time()
    while step < (end_range - start_range):
        cpub = point_to_cpub(S)
        cpub_hash = hash_cpub(cpub)  # Hash the current compressed public key
        # Check if the hash exists in the baby_table
        if cpub_hash in baby_table:
            b = baby_table[cpub_hash]
            k = start_range + step + b
            if point_to_cpub(mul(k)) == puzzle_pubkey:
                print(f'[+] m={m} step={step} b={b}')
                print(f'[+] Key found: {k}')
                print("[+] Time Spent : {0:.2f} seconds".format(time.time() - st))
                sys.exit()
        S = point_subtraction(S, m_P)
        step += m

    print('[+] Key not found')
    print("[+] Time Spent : {0:.2f} seconds".format(time.time() - st))


puzzle 40
  • BSGS: Thu Feb 20 21:49:30 2025
  • Creating babyTable...
  • BSGS Search in progress
  • m=741455 step=453895024440 b=574622
  • Key found: 1003651412950
  • Time Spent : 2.90 seconds


puzzle 50
  • BSGS: Thu Feb 20 22:13:12 2025
  • Creating babyTable...
  • BSGS Search in progress
  • m=23726566 step=48190529944714 b=12801738
  • Key found: 611140496167764
  • Time Spent : 12.71 seconds

This is the result... on a single core Grin

P.S. For puzzles above 50, you'll need a Bloom Filter



Who wrote this code?!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Share your donation address I can see light at the end of a tunnel.

Yes, I agree that NoMachine is great for coding, but did you know it only works if you have a public key!!? That’s clearly tied to the current puzzles.

Also, there's a better option from RC that uses GPU.

Regards.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 04/06/2025, 00:35:12 UTC
Does anyone know who the author of the puzzle is?JPL?…

Here is the creator :
https://bitcointalk.org/index.php?action=profile;u=991321
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 29/05/2025, 18:58:17 UTC
what kind of speed should i expect when using python to brute force 12 word bip39 seed phrase from word list?
Pure Python implementation should get you maybe like a dozen or two per second, that's all.

it shows around 10000h/s
Sounds like you are doing part of the work only. I was testing the whole thing like getting a list of deterministic keys/addresses and so on.

atleast it found test phrase.
now playing with https://privatekeys.pw/puzzles/0.2-btc-puzzle



hopeless:
Scanning 23,298,085,122,481 Electrum v1 seed combinations using 8 cores...
[5.0s] Checked: 5,108,500 | Speed: 1,021,699/s | Progress: 0.000022%

Don’t waste your time on this  it’s an endless attempt with near zero chance of success. Thhe creator hasn’t updated or even signed the puzzle address. It’s not worth 0.2 BTC; you’re better off sticking with the 32 BTC puzzle instead.


It is useless mess. As i can see it is electrum 1626, but can not find even 12 correct candinates.

advanceed research :
https://github.com/AlberTajuelo/bitcoin-0.2-image-puzzle/tree/master
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 29/05/2025, 15:15:38 UTC
what kind of speed should i expect when using python to brute force 12 word bip39 seed phrase from word list?
Pure Python implementation should get you maybe like a dozen or two per second, that's all.

it shows around 10000h/s
Sounds like you are doing part of the work only. I was testing the whole thing like getting a list of deterministic keys/addresses and so on.

atleast it found test phrase.
now playing with https://privatekeys.pw/puzzles/0.2-btc-puzzle

Code:
import time
import itertools
from multiprocessing import Pool, cpu_count
import hashlib, struct, base58
from ecdsa import SigningKey, SECP256k1

# === Configuration ===
TARGET_ADDRESS = "1KfZGvwZxsvSmemoCmEV75uqcNzYBHjkHZ"

#
position_words = {
    1:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    2:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    3:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    4:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    5:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    6:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    7:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    8:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    9:  ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    10: ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    11: ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"],
    12: ["black", "this", "order", "find", "real", "subject", "food", "truth", "hidden", "future", "freedom", "power", "welcome"]
}

REPORT_INTERVAL = 5  # seconds

# === Private key to P2PKH address ===
def private_to_address(priv):
    sk = SigningKey.from_string(priv, curve=SECP256k1)
    pub = b'\x04' + sk.verifying_key.to_string()
    sha = hashlib.sha256(pub).digest()
    ripe = hashlib.new('ripemd160', sha).digest()
    prefixed = b'\x00' + ripe
    checksum = hashlib.sha256(hashlib.sha256(prefixed).digest()).digest()[:4]
    return base58.b58encode(prefixed + checksum).decode()

# === Electrum v1 seed to address ===
def electrum_seed_to_addr(seed_words):
    phrase = ' '.join(seed_words)
    seed = hashlib.sha512(phrase.encode('utf-8')).digest()
    priv_key = seed[:32]
    return private_to_address(priv_key)

# === Combination checker ===
def check_combination(combo):
    if len(set(combo)) < len(combo):  # enforce unique words
        return None
    try:
        address = electrum_seed_to_addr(combo)
        if address == TARGET_ADDRESS:
            return combo
    except:
        return None
    return None

# === Parallel combination scanner ===
def scan_combinations_parallel():
    word_lists = [position_words[i + 1] for i in range(12)]
    total = 1
    for lst in word_lists:
        total *= len(lst)

    print(f"Scanning {total:,} Electrum v1 seed combinations using {cpu_count()} cores...")

    start = time.time()
    last_report = start
    pool = Pool(cpu_count())

    generator = itertools.product(*word_lists)

    for i, result in enumerate(pool.imap_unordered(check_combination, generator, chunksize=500)):
        now = time.time()
        if now - last_report >= REPORT_INTERVAL:
            elapsed = now - start
            speed = i / elapsed
            progress = (i / total) * 100
            print(f"[{elapsed:.1f}s] Checked: {i:,} | Speed: {speed:,.0f}/s | Progress: {progress:.6f}%")
            last_report = now

        if result:
            print("\nSUCCESS! Valid Electrum seed found:")
            print(" ".join(result))
            print(f"Address: {TARGET_ADDRESS}")
            pool.terminate()
            return

    print("\nDone. No matching Electrum-style mnemonic found.")

# === Main ===
if __name__ == "__main__":
    scan_combinations_parallel()


hopeless:
Scanning 23,298,085,122,481 Electrum v1 seed combinations using 8 cores...
[5.0s] Checked: 5,108,500 | Speed: 1,021,699/s | Progress: 0.000022%

Don’t waste your time on this  it’s an endless attempt with near zero chance of success. Thhe creator hasn’t updated or even signed the puzzle address. It’s not worth 0.2 BTC; you’re better off sticking with the 32 BTC puzzle instead.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
Frequence
on 27/05/2025, 02:38:12 UTC
i dont get the idea of range f6f543.
while all talk, range scanned to be empty

Lady, this has nothing to do with the prefix scan range. This is the HASH160 of a Bitcoin address.

And here is the correct sequence from private key to Bitcoin address:

Private Key


→ Public Key (via Elliptic Curve multiplication)

→ SHA-256 of the public key

→ RIPEMD-160 of the SHA-256 result (this gives the HASH160) ( this step )
they are talking about this as they want to get the public key for fast decryption and they will fail !

→ Add Network Byte (e.g., 0x00 for mainnet)

→ SHA-256 of that

→ SHA-256 again

→ Take first 4 bytes (checksum)

→ Append checksum to HASH160 + network byte

→ Base58Check encode

= Bitcoin Address