Search content
Sort by

Showing 20 of 20 results by fmg75
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 24/09/2025, 14:34:00 UTC
Is there a ready-made program that allows you to calculate not sequential keys,
 but your own values ​​from an external or internal generator on the GPU?


I don't know if it exists, but it would be very inefficient for mathematical reasons; I wouldn't be able to perform modular inversion efficiently.
I'm working on a code that allows for arbitrary ranges, not powers of 2, as is often the case.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 23/09/2025, 13:05:28 UTC
This puzzle is very strange. If it's for measuring the world's brute forcing capacity, 161-256 are just a waste (RIPEMD160 entropy is filled by 160, and by all of P2PKH Bitcoin). The puzzle creator could improve the puzzle's utility without bringing in any extra funds from outside - just spend 161-256 across to the unsolved portion 51-160, and roughly treble the puzzle's content density.

If on the other hand there's a pattern to find... well... that's awfully open-ended... can we have a hint or two? Cheesy

I am the creator.

You are quite right, 161-256 are silly.  I honestly just did not think of this.  What is especially embarrassing, is this did not occur to me once, in two years.  By way of excuse, I was not really thinking much about the puzzle at all.

I will make up for two years of stupidity.  I will spend from 161-256 to the unsolved parts, as you suggest.  In addition, I intend to add further funds.  My aim is to boost the density by a factor of 10, from 0.001*length(key) to 0.01*length(key).  Probably in the next few weeks.  At any rate, when I next have an extended period of quiet and calm, to construct the new transaction carefully.

A few words about the puzzle.  There is no pattern.  It is just consecutive keys from a deterministic wallet (masked with leading 000...0001 to set difficulty).  It is simply a crude measuring instrument, of the cracking strength of the community.

Finally, I wish to express appreciation of the efforts of all developers of new cracking tools and technology.  The "large bitcoin collider" is especially innovative and interesting!

Hello.

I've been working on this challenge for a few months. I've tested several equations.
You put the compressed public key in wallets 135, 140, 145, 150, 155, and 160. Is there a reason for this, or is it just random information?


While this forum is very extensive, if you dedicate time and seek out the experts who provide the most useful information, you'll find the answers to your questions. Take your time.
Regarding keys that are multiples of 5, that's part of the game now; you just have to use other tools to calculate the private key, knowing the public key.


https://privatekeys.pw/puzzles/bitcoin-puzzle-tx?table=1&status=solved#p27
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 22/09/2025, 14:56:07 UTC

An update to CUDACyclone that generates non-repeating, persistent random subranges.
Ideal for collaborative search.

./CUDACyclone \                                                                                                                                                 
              --range 400000000000000000:7fffffffffffffffff \
              --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \
              --random-subranges --num-subranges 10000000 --grid 256,8
Hello man, update your software. Previous version of a Cyclone has a bug. I did a mistake with a first batch of the thread, not right computing center point of the first batch, and than the last batch finish not in the end of the range. Last half batch of points from the end of the each thread doesnt computing!

wich CUDA version are you using to compile it ?

CUDA 12.0.140
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 22/09/2025, 13:25:27 UTC
The great challenge of these brute-force implementations is probabilistically minimizing the chances of key "losses." In such large search spaces, this is very difficult. You can never be 100% sure that you have verified all the keys. There is much work to improve these algorithms.

I addressed this issue some long time ago. In a nutshell, there is no need to probabilistically minimize bad coding, it is enough to validate the results of some range, using a second ground-truth validation run, which is guaranteed 100% to be valid. For example, testing some random range both on the GPU, and on the CPU (using a stable implementation, like libsecp256k1), and comparing some hash of all the results.

If the hash matches, and all GPU models are tested properly, then everything went OK and the GPU code is thus reliable.

I would never, ever, ever, EVER have blind trust on some anonymous code which lacks basic testing scenarios, especially more so if that code is supposed to be run billions of times in a row. The only result is what happened here, which can be painful.

Which do you consider the most tested implementation?
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 22/09/2025, 00:24:31 UTC

An update to CUDACyclone that generates non-repeating, persistent random subranges.
Ideal for collaborative search.

./CUDACyclone \                                                                                                                                                 
              --range 400000000000000000:7fffffffffffffffff \
              --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \
              --random-subranges --num-subranges 10000000 --grid 256,8
Hello man, update your software. Previous version of a Cyclone has a bug. I did a mistake with a first batch of the thread, not right computing center point of the first batch, and than the last batch finish not in the end of the range. Last half batch of points from the end of the each thread doesnt computing!

Hi, what was exactly the bug in the software? How would I rescan the already covered ranges?

Suppose my command with older version was
Code:
./CUDACyclone --range 40003da10000000000:40003da1ffffffffff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512

Do I need to run this range once again with
Code:
./CUDACyclone --range 40003da10000000000:40003da100000000ff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512
and
Code:
./CUDACyclone --range 40003da1ffffffff00:40003da1ffffffffff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512
to recheck for the missing keys?

I want to clarify that my post refers to a modified version of the original CUDACyclone project, where I added the features I mentioned.
I don't know what bugs @FrozenThroneGuy is referring to.

Idk, I have addressed my message to the owner of https://github.com/Dookoo2/CUDACyclone who admitted in code that there was an issue with missing keys. I'd want to know the workaround strategies to not fully rescan the ranges which were previously scanned with the bugged software.

The updated code fixes issues with lost keys at the ends of the ranges.
But I'm not sure if that's the only problem.
I don't see a reliable way to 100% guarantee that there are no lost keys in other parts of the range.



The great challenge of these brute-force implementations is probabilistically minimizing the chances of key "losses." In such large search spaces, this is very difficult. You can never be 100% sure that you have verified all the keys. There is much work to improve these algorithms.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 21/09/2025, 22:12:41 UTC

An update to CUDACyclone that generates non-repeating, persistent random subranges.
Ideal for collaborative search.

./CUDACyclone \                                                                                                                                                 
              --range 400000000000000000:7fffffffffffffffff \
              --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \
              --random-subranges --num-subranges 10000000 --grid 256,8
Hello man, update your software. Previous version of a Cyclone has a bug. I did a mistake with a first batch of the thread, not right computing center point of the first batch, and than the last batch finish not in the end of the range. Last half batch of points from the end of the each thread doesnt computing!

Hi, what was exactly the bug in the software? How would I rescan the already covered ranges?

Suppose my command with older version was
Code:
./CUDACyclone --range 40003da10000000000:40003da1ffffffffff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512

Do I need to run this range once again with
Code:
./CUDACyclone --range 40003da10000000000:40003da100000000ff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512
and
Code:
./CUDACyclone --range 40003da1ffffffff00:40003da1ffffffffff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512
to recheck for the missing keys?

I want to clarify that my post refers to a modified version of the original CUDACyclone project, where I added the features I mentioned.
I don't know what bugs @FrozenThroneGuy is referring to.

Idk, I have addressed my message to the owner of https://github.com/Dookoo2/CUDACyclone who admitted in code that there was an issue with missing keys. I'd want to know the workaround strategies to not fully rescan the ranges which were previously scanned with the bugged software.

The updated code fixes issues with lost keys at the ends of the ranges.
But I'm not sure if that's the only problem.
I don't see a reliable way to 100% guarantee that there are no lost keys in other parts of the range.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 21/09/2025, 13:26:46 UTC

An update to CUDACyclone that generates non-repeating, persistent random subranges.
Ideal for collaborative search.

./CUDACyclone \                                                                                                                                                 
              --range 400000000000000000:7fffffffffffffffff \
              --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \
              --random-subranges --num-subranges 10000000 --grid 256,8
Hello man, update your software. Previous version of a Cyclone has a bug. I did a mistake with a first batch of the thread, not right computing center point of the first batch, and than the last batch finish not in the end of the range. Last half batch of points from the end of the each thread doesnt computing!

Hi, what was exactly the bug in the software? How would I rescan the already covered ranges?

Suppose my command with older version was
Code:
./CUDACyclone --range 40003da10000000000:40003da1ffffffffff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512

Do I need to run this range once again with
Code:
./CUDACyclone --range 40003da10000000000:40003da100000000ff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512
and
Code:
./CUDACyclone --range 40003da1ffffffff00:40003da1ffffffffff --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU --grid 512,512
to recheck for the missing keys?

I want to clarify that my post refers to a modified version of the original CUDACyclone project, where I added the features I mentioned.
I don't know what bugs @FrozenThroneGuy is referring to.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 20/09/2025, 22:26:36 UTC
On which world do you live? This things are very simple. You have any ideea how to code? And use ML/AI in this domain? If you don't, please make a research, There is no need of 2-3 people to do this and not even 18h/day.
The BCT node is taking 5 min to build and the rest of time is depending of sync all blocks...
The server is built in 10 min...
The script to make database in 15-20 min with all correction...
If you cannot do it, this do not means that nobody can do it....

He has a general idea of ​​the topics he mentions, but his lack of technical mastery of them, plus his lack of humility, leads him to post nonsense.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 20/09/2025, 18:52:14 UTC
It seems that there are no longer many people paying attention to this thread.

As for myself: About two weeks ago I stopped checking-in here and instead went back and read the first ~20 pages, and since then I've been skipping around, randomly reading a page or two here and there... It has helped me regain my sanity, refocus me, and I learned something new, which hasn't happened in the past few months of following only the latest comments...

Behind this forum anybody is anybody...but the problem is in real life...staying here and put a message in order to manipulate others is a trend...
By reading all this pages that makes sense for technical stuff i was building in 1 week the next things:
-my own BTC nodes and other principal coins
-RPC server for each node
-API server acting as a buffer in order to interogate 1M addresses balances every second
-Private BTC addresses directory with 100k addresses, hex, hash,wif and balance that is processes every 0,1ms due to a special encoding of data built by me to support this buffer
-API scanning server with 2000 clients in paralel session every second
-own database for addresses that i was scanning
-redundant nodes over TOR network
-a lot of GPU with minimum 24GB in order to have a lot of power for AI and scanning

Power bill is over 1000$ every  month, but for learning do not matter the cost.

For me this thread as usefull until new accounts come and added a joke of information...if you want to learn more invest in yourself at least 20% of what you warn every month


I don't know if you did some basic math:
- You say 1 million addresses/sec.
- Puzzle 71 search space = 2^71 addresses

Estimated time = (2^71) ÷ (10^6×60×60 ×24×365) = 74872629 years
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 20/09/2025, 17:37:50 UTC
It seems that there are no longer many people paying attention to this thread.

As for myself: About two weeks ago I stopped checking-in here and instead went back and read the first ~20 pages, and since then I've been skipping around, randomly reading a page or two here and there... It has helped me regain my sanity, refocus me, and I learned something new, which hasn't happened in the past few months of following only the latest comments...

This easy-to-use Python script can be helpful in exploring the content of this great forum.

https://pastebin.com/7YVmeyfQ

 python3 btctalk_thread.py   --url "https://bitcointalk.org/index.php?topic=1306983.0"   --out out_puzzle   --delay 1.0   --from-page 20 --to-page 40
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 20/09/2025, 16:15:23 UTC

An update to CUDACyclone that generates non-repeating, persistent random subranges.
Ideal for collaborative search.

./CUDACyclone \                                                                                                                                                 
              --range 400000000000000000:7fffffffffffffffff \
              --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \
              --random-subranges --num-subranges 10000000 --grid 256,8
Hello man, update your software. Previous version of a Cyclone has a bug. I did a mistake with a first batch of the thread, not right computing center point of the first batch, and than the last batch finish not in the end of the range. Last half batch of points from the end of the each thread doesnt computing!


Specifically, which version are you referring to?
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 20/09/2025, 16:07:15 UTC

An update to CUDACyclone that generates non-repeating, persistent random subranges.
Ideal for collaborative search.

./CUDACyclone \                                                                                                                                                 
              --range 400000000000000000:7fffffffffffffffff \
              --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \
              --random-subranges --num-subranges 10000000 --grid 256,8

Would it not be faster if you target Hash 160 of the Address instead of the BTC Address. i.e. cut down on calculating Address from PK which is not needed.


Internally, the comparison is made against hash160().
The address is displayed in the interface for convenience only.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 18/09/2025, 20:39:47 UTC

An update to CUDACyclone that generates non-repeating, persistent random subranges.
Ideal for collaborative search.

./CUDACyclone \                                                                                                                                                 
              --range 400000000000000000:7fffffffffffffffff \
              --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \
              --random-subranges --num-subranges 10000000 --grid 256,8
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 16/09/2025, 22:32:19 UTC
You generally cannot directly broadcast a BTC transaction to miners without it entering the mempool, as the mempool is the standard, unavoidable gateway for transactions to be picked up and confirmed by the network. Bitcoin's design relies on the peer-to-peer network to relay transactions to nodes, which store them in their respective mempools before miners select them for inclusion in blocks. The only widely established method to bypass the mempool for most transactions is to use the Lightning Network, a second-layer protocol for fast, off-chain payments that only requires the main blockchain for opening and closing payment channels.


You're wrong.

This is exactly what anyone who finds a puzzle's private key should do. Avoid the public mempool and send the tx to a private node.
Otherwise, they risk a front-running attack.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 16/09/2025, 20:46:35 UTC
If broadcasting a transaction from a solved Bitcoin puzzle gets hijacked instantly by bots, does that mean all transactions spending from solved puzzles were mined directly ? And if the publick keys to certain puzzle addresses are already exposed publicly, why haven’t the bots swept those funds yet, if they claim they can steal coins within seconds?


You have some conceptual errors about the problem:

With the public keys exposed, you can't move funds ---> You need to calculate the private key, currently puzzle 135 and multiples of 5 and up. ---> Use the polling kangaroo algorithm, etc.

Bots can attack the PVKs of smaller puzzles, currently 71 and up, since it computationally leaves a window.

In my humble opinion, small players currently have no chance.

A large player who finds puzzle 71 will look for a very secure way to propagate, obviously avoiding the mempool.
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 16/09/2025, 19:39:44 UTC

Prefix or Suffix version with Stride..


1PWo3JeB95vecqb8fQ2tGzQ3T4fHxSmb1K 7xxxxx
1PWo3JeB9dobsiumbqYAJtkzQv8Lk71Md4 6xxxxx
1PWo3JeB9jA9uQUhPRNN91rR8kgqF3p1cQ 6xxxxx
1PWo3JeB9jpRt9dKR4PpzCAZYHWMm2rxf3 6xxxxx
1PWo3JeB9jKEPk1EQFVSdEhZamuij4msWV 6xxxxx
1PWo3JeB9jfwjqW7vCc9aNqnEbdPu9GUqS 5xxxxx
1PWo3JeB9jWQNfEGn2Ap9o5dHxnXfEbucf 6xxxxx
1PWo3JeB9jWG3HZmrcLtrFD5NhYd9UKYgD 6xxxxx
1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU

What do you mean by that?

Share the last 4 bytes of your prefix address’s private key (PVK) and I’ll return every possible prefix within the 71-bit range in about 3 minutes on a single RTX 3060 Ti.
(You can get similar results with BitCrack, but BitCrack only returns the PVK for the target address — it won’t list PVKs that belong to matching prefix addresses.)

Example:
Prefix Address: 1PWo3JeB9jRLz2NjTHsZ8uTBnqcjnu66Ak
Last 4 bytes of PVK: B3E74856

Result: Smiley

1PWo3JggWE4Yn7ARaUBvYN6J1oPiKsThWJ  40133AD921B3E74856
1PWo3Jg6eJsDk9Hc47HR1wRGBgMtzp4ckV  4025698C3FB3E74856
1PWo3JeqdbckR9P66rSwNTumiNPRpKFexo  41549C313AB3E74856
1PWo3JfVxseXDayTF2qhurrX9DC2QKikqk  41FAE86E8BB3E74856
1PWo3JhAZwrk2oPDqK7QZWh5y7SGtMB5Je  42662C29A0B3E74856
1PWo3JePottCGRD6W3QckjoEkZ1SPrFAsj  4633808179B3E74856
1PWo3Jdhnapvx9D2BEQ3sviBEDGBCCR8TN  4690CADC94B3E74856
1PWo3JeVQrA2eqMowVPSQwDtgcVA1LBEvK  491EA84BE4B3E74856
1PWo3JfwZbHsqUa6f4CdwjWNWV3r3JJ5oh  49653FE0DEB3E74856
1PWo3Jeo36x59g447Z42mGp4PiNxfBoP27  49CAEB0C2FB3E74856
1PWo3JefLnj17Sh7jSywhKjCxRh1vkavbu  4A491A9A5FB3E74856
1PWo3JeNWrEr9JGPprZD32KJPmbnDJwN5q  4AEABEF18BB3E74856
1PWo3JeSdbTLtmSTLpBJef2tr87VwxSZhB  4B03EA12E1B3E74856
1PWo3JfjqnFeN4gevp5NagVTttqnC73tCd  4B49E10D30B3E74856
1PWo3Jf1UPqUW1vuDEytFh5VyJqz533t1U  4D71AAD224B3E74856
1PWo3JfHu89aF3N4LsKVmTptPuGW5v3pE1  4ED6AC14E5B3E74856
1PWo3Jefa3yQs8GCuRUxesGbB7Z8oTMYEv  5075542428B3E74856
1PWo3JfTiUM3T8srd3VvrA2ravGTh6jvpK  51CC19CE58B3E74856
1PWo3Jg3eRCkQ9ruh43AELgCjq5MGJQJc1  55F2D9179AB3E74856
1PWo3JfjZpsyAvVyfKnGDT7zyxqqiurRoa  56F933F253B3E74856
1PWo3JgznMcjLrWNzy4JZs4PzQgrzZF2GZ  57105FAF6DB3E74856
1PWo3JgfMKQS39M5i8gerqqBeJMxtXVv84  5941245810B3E74856
1PWo3JgLYrnfX4KSSMeTDhi8o5iREtrKiq  59FACE5476B3E74856
1PWo3Je9vrzA41Wwfj6MD63nYUNAoYpcyx  5AB983701BB3E74856
1PWo3JeD4B6tS3gX6NiXFoG18jaM1Bvdd8  5CF10D43A2B3E74856
1PWo3Jghp1UiGrXPKNZs4q8dfxJUttHSzu  5D59DAB815B3E74856
1PWo3JeeQ9ZdMe9WnQAT1FX7ikKwfRxWZe  5DEF2653CEB3E74856
1PWo3JfGeanixGULb67AarUhsmU16vtQNB  5F52890505B3E74856
1PWo3JgpoHpDPznsagYsw2ZrKbu7UvFxcG  6033874F4BB3E74856
1PWo3Jfpktjq9egzWjXHo7R4qRkG6G6Qb3  63DF9AD9D9B3E74856
1PWo3JeB9jRLz2NjTHsZ8uTBnqcjnu66Ak  649A103B78B3E74856
1PWo3JfPDscTNBbngkSz9JYFuMqGPtfkeM  64B28C5236B3E74856
1PWo3JeiWyLKNbpgnqdn3UX3W5qQr4exug  66295DB32DB3E74856
1PWo3JgP7WUyKS9PCntnbdaiH8CQpJadeC  6959ED2636B3E74856
1PWo3JfCSNh9fyTNtQjphApy2GGQ4itWH8  6995CCD229B3E74856
1PWo3Jem9E5o8cbwp1qWeEXSQdcPDFVSaE  6A98F49A87B3E74856
1PWo3Jh98ZotrYYvqFV9A9a8ke8rYJ8Sa8  6B46315E8BB3E74856
1PWo3JgC5DbJyVKj5cNieRjQQpTnsbm8S3  70609EEBA0B3E74856
1PWo3JdsAnDUbAmDD5KHkvBjteK7pTXNaM  7090418EE7B3E74856
1PWo3Jgo2mdCHkPRVVybhmbZE3NbGfk7ic  71BA578072B3E74856
1PWo3JdsKfUUpp7VCV8BPfFpZTNHCPcdvS  71CF8FAA53B3E74856
1PWo3Je2YFKbobawHVmCirWsexxPr6jr1i  71F2806D71B3E74856
1PWo3JeKtSEHvpj9EcLKSWKGQZavXrSLAA  7240EF5B90B3E74856
1PWo3JeJrtDLaSvekA3xQCAgeV7ZAbjVL9  729BBF9186B3E74856
1PWo3JdfNekTD4jZ5M1dXN2towV3W12TVq  74642E8DB8B3E74856
1PWo3JgKzLomY4UncwkqXCMC6GHyzBUMUK  7783F49749B3E74856
1PWo3JggbDLt4tgYKAdK1qyXQYy2eZeQTx  7A77F6E928B3E74856
1PWo3Jf9rxY3Tg8DaRCT58KwP8EJdTVpMs  7C022DA704B3E74856
1PWo3JfGMLXZgFkLH5FttazYndVuCbAcxC  7E5B3A895FB3E74856
1PWo3JgxtbKp8TF3kg6W2mbPnryXWweq5X  7E8C056295B3E74856
1PWo3JfyFVTTNE6dM4pHECVBcKkd7UzjP4  7FCC9D2EA5B3E74856
1PWo3JfqPMwrLmd969oN7oipCPshiCSZAH  7FF2A3D7C2B3E74856


What's the point of this search?
There are no patterns in elliptic curve operations!

If no pattern. Then why private key with same last 6 hex many match the front prefix like that zahid prefix jumper 😅. There might be pattern but complex pattern ✌️

I mean if you found 500-1000 prefix . It might give high chance using this jumper test that 500-1000 prefix that you found before to get the answer .......



What you believe (incorrectly):

"Cryptographic operations preserve patterns!"
"There's hidden mathematical structure in secp256k1!"
"It's a fascinating cryptographic correlation!"

What it REALLY is:

Vanity mining with reduced search space
Pure brute force in feasible range (2^71)
Basic statistics: enough attempts → expected matches
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 15/09/2025, 22:03:43 UTC

Prefix or Suffix version with Stride..


1PWo3JeB95vecqb8fQ2tGzQ3T4fHxSmb1K 7xxxxx
1PWo3JeB9dobsiumbqYAJtkzQv8Lk71Md4 6xxxxx
1PWo3JeB9jA9uQUhPRNN91rR8kgqF3p1cQ 6xxxxx
1PWo3JeB9jpRt9dKR4PpzCAZYHWMm2rxf3 6xxxxx
1PWo3JeB9jKEPk1EQFVSdEhZamuij4msWV 6xxxxx
1PWo3JeB9jfwjqW7vCc9aNqnEbdPu9GUqS 5xxxxx
1PWo3JeB9jWQNfEGn2Ap9o5dHxnXfEbucf 6xxxxx
1PWo3JeB9jWG3HZmrcLtrFD5NhYd9UKYgD 6xxxxx
1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU

What do you mean by that?

Share the last 4 bytes of your prefix address’s private key (PVK) and I’ll return every possible prefix within the 71-bit range in about 3 minutes on a single RTX 3060 Ti.
(You can get similar results with BitCrack, but BitCrack only returns the PVK for the target address — it won’t list PVKs that belong to matching prefix addresses.)

Example:
Prefix Address: 1PWo3JeB9jRLz2NjTHsZ8uTBnqcjnu66Ak
Last 4 bytes of PVK: B3E74856

Result: Smiley

1PWo3JggWE4Yn7ARaUBvYN6J1oPiKsThWJ  40133AD921B3E74856
1PWo3Jg6eJsDk9Hc47HR1wRGBgMtzp4ckV  4025698C3FB3E74856
1PWo3JeqdbckR9P66rSwNTumiNPRpKFexo  41549C313AB3E74856
1PWo3JfVxseXDayTF2qhurrX9DC2QKikqk  41FAE86E8BB3E74856
1PWo3JhAZwrk2oPDqK7QZWh5y7SGtMB5Je  42662C29A0B3E74856
1PWo3JePottCGRD6W3QckjoEkZ1SPrFAsj  4633808179B3E74856
1PWo3Jdhnapvx9D2BEQ3sviBEDGBCCR8TN  4690CADC94B3E74856
1PWo3JeVQrA2eqMowVPSQwDtgcVA1LBEvK  491EA84BE4B3E74856
1PWo3JfwZbHsqUa6f4CdwjWNWV3r3JJ5oh  49653FE0DEB3E74856
1PWo3Jeo36x59g447Z42mGp4PiNxfBoP27  49CAEB0C2FB3E74856
1PWo3JefLnj17Sh7jSywhKjCxRh1vkavbu  4A491A9A5FB3E74856
1PWo3JeNWrEr9JGPprZD32KJPmbnDJwN5q  4AEABEF18BB3E74856
1PWo3JeSdbTLtmSTLpBJef2tr87VwxSZhB  4B03EA12E1B3E74856
1PWo3JfjqnFeN4gevp5NagVTttqnC73tCd  4B49E10D30B3E74856
1PWo3Jf1UPqUW1vuDEytFh5VyJqz533t1U  4D71AAD224B3E74856
1PWo3JfHu89aF3N4LsKVmTptPuGW5v3pE1  4ED6AC14E5B3E74856
1PWo3Jefa3yQs8GCuRUxesGbB7Z8oTMYEv  5075542428B3E74856
1PWo3JfTiUM3T8srd3VvrA2ravGTh6jvpK  51CC19CE58B3E74856
1PWo3Jg3eRCkQ9ruh43AELgCjq5MGJQJc1  55F2D9179AB3E74856
1PWo3JfjZpsyAvVyfKnGDT7zyxqqiurRoa  56F933F253B3E74856
1PWo3JgznMcjLrWNzy4JZs4PzQgrzZF2GZ  57105FAF6DB3E74856
1PWo3JgfMKQS39M5i8gerqqBeJMxtXVv84  5941245810B3E74856
1PWo3JgLYrnfX4KSSMeTDhi8o5iREtrKiq  59FACE5476B3E74856
1PWo3Je9vrzA41Wwfj6MD63nYUNAoYpcyx  5AB983701BB3E74856
1PWo3JeD4B6tS3gX6NiXFoG18jaM1Bvdd8  5CF10D43A2B3E74856
1PWo3Jghp1UiGrXPKNZs4q8dfxJUttHSzu  5D59DAB815B3E74856
1PWo3JeeQ9ZdMe9WnQAT1FX7ikKwfRxWZe  5DEF2653CEB3E74856
1PWo3JfGeanixGULb67AarUhsmU16vtQNB  5F52890505B3E74856
1PWo3JgpoHpDPznsagYsw2ZrKbu7UvFxcG  6033874F4BB3E74856
1PWo3Jfpktjq9egzWjXHo7R4qRkG6G6Qb3  63DF9AD9D9B3E74856
1PWo3JeB9jRLz2NjTHsZ8uTBnqcjnu66Ak  649A103B78B3E74856
1PWo3JfPDscTNBbngkSz9JYFuMqGPtfkeM  64B28C5236B3E74856
1PWo3JeiWyLKNbpgnqdn3UX3W5qQr4exug  66295DB32DB3E74856
1PWo3JgP7WUyKS9PCntnbdaiH8CQpJadeC  6959ED2636B3E74856
1PWo3JfCSNh9fyTNtQjphApy2GGQ4itWH8  6995CCD229B3E74856
1PWo3Jem9E5o8cbwp1qWeEXSQdcPDFVSaE  6A98F49A87B3E74856
1PWo3Jh98ZotrYYvqFV9A9a8ke8rYJ8Sa8  6B46315E8BB3E74856
1PWo3JgC5DbJyVKj5cNieRjQQpTnsbm8S3  70609EEBA0B3E74856
1PWo3JdsAnDUbAmDD5KHkvBjteK7pTXNaM  7090418EE7B3E74856
1PWo3Jgo2mdCHkPRVVybhmbZE3NbGfk7ic  71BA578072B3E74856
1PWo3JdsKfUUpp7VCV8BPfFpZTNHCPcdvS  71CF8FAA53B3E74856
1PWo3Je2YFKbobawHVmCirWsexxPr6jr1i  71F2806D71B3E74856
1PWo3JeKtSEHvpj9EcLKSWKGQZavXrSLAA  7240EF5B90B3E74856
1PWo3JeJrtDLaSvekA3xQCAgeV7ZAbjVL9  729BBF9186B3E74856
1PWo3JdfNekTD4jZ5M1dXN2towV3W12TVq  74642E8DB8B3E74856
1PWo3JgKzLomY4UncwkqXCMC6GHyzBUMUK  7783F49749B3E74856
1PWo3JggbDLt4tgYKAdK1qyXQYy2eZeQTx  7A77F6E928B3E74856
1PWo3Jf9rxY3Tg8DaRCT58KwP8EJdTVpMs  7C022DA704B3E74856
1PWo3JfGMLXZgFkLH5FttazYndVuCbAcxC  7E5B3A895FB3E74856
1PWo3JgxtbKp8TF3kg6W2mbPnryXWweq5X  7E8C056295B3E74856
1PWo3JfyFVTTNE6dM4pHECVBcKkd7UzjP4  7FCC9D2EA5B3E74856
1PWo3JfqPMwrLmd969oN7oipCPshiCSZAH  7FF2A3D7C2B3E74856


What's the point of this search?
There are no patterns in elliptic curve operations!
Post
Topic
Board Bitcoin Discussion
Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it
by
fmg75
on 14/09/2025, 22:04:26 UTC
What evidence is there that the puzzle's creator isn't the one who moved the funds?
And is the search rank just a hope given previous results?
Post
Topic
Board Project Development
Re: Bitcoin Visual private key generator
by
fmg75
on 18/06/2025, 20:47:39 UTC
Post
Topic
Board Project Development
Re: Bitcoin Visual private key generator
by
fmg75
on 18/06/2025, 20:41:32 UTC
Inspired by this great work is a version developed in Python. Wink

https://visualbtc.streamlit.app/