Pages:
Author

Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED== - page 36. (Read 47899 times)

hero member
Activity: 862
Merit: 662
On android use termux with the Iceland scripts in python, also with keyhunt you can work in android with some trillions of keys/s in bsgs mode
member
Activity: 406
Merit: 45

just testing brute force on mobile phone
using Pydroid 3 you need to buy premium only because when advertising show python script will be close and running script is terminate

I have old mobile phone , may be can useful because my laptop use for works (run GPU on free time)
may be smartphone slow CPU brute force can get random found because it is slow calculate more than fast GPU brute force whos know at random mode brute force







full member
Activity: 431
Merit: 105
fixed the building but clean and not with any of these additions from the guys here,
so want to have one try at it. i remember not having touched any or added anything to these lines.

jr. member
Activity: 63
Merit: 8
Code:

  fprintf(f, "\n====  %04d-%02d-%02d %02d:%02d:%02d =====\n", time.wYear, time.wMonth, time.wDay, time.wHour, time.wMinute, [Suspicious link removed]econd);
  fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() );

 
 

  fprintf(f, "\n====  %04d-%02d-%02d %02d:%02d =====\n", time.wYear, time.wMonth, time.wDay, time.wHour, time.wMinute);

  wSecond had changed.... not my source code.

full member
Activity: 1078
Merit: 219
Shooters Shoot...
thanks so much,

That is Ok, C can work with correctly if you want remove the warning you can write this:

Code:
sscanf(&seed[2 * i], "%02X",(unsigned int *)( &my1ch)); 

this above part, made that warning go away, but i have a lot of undeclared identifiers?
Severity            Code   Description                                                                           Project           File           Line   Suppression State

Error   C2065   'seed': undeclared identifier                                                                   VanitySearch   main.cpp   156   

Error   C2447   '{': missing function header (old-style formal list?)                                   VanitySearch   vanity.cpp   946   

Error   C4430   missing type specifier - int assumed. Note: C++ does not support default-int   VanitySearch     vanity.cpp   983   

and some other

error C2143: syntax error: missing ';' before '}'
error C2143: syntax error: missing ';' before '{'

your first solution worked flawless btw. thanks again

[/quote]
What exactly are you trying to do? Which program are you trying to tweak and what are you wanting it to do? If you tell me, I can help, if it's dealing with any of the VanitySearch programs
full member
Activity: 431
Merit: 105
thanks so much,

That is Ok, C can work with correctly if you want remove the warning you can write this:

Code:
sscanf(&seed[2 * i], "%02X",(unsigned int *)( &my1ch)); 
[/quote]

this above part, made that warning go away, but i have a lot of undeclared identifiers?
Severity            Code   Description                                                                           Project           File           Line   Suppression State

Error   C2065   'seed': undeclared identifier                                                                   VanitySearch   main.cpp   156   

Error   C2447   '{': missing function header (old-style formal list?)                                   VanitySearch   vanity.cpp   946   

Error   C4430   missing type specifier - int assumed. Note: C++ does not support default-int   VanitySearch     vanity.cpp   983   

and some other

error C2143: syntax error: missing ';' before '}'
error C2143: syntax error: missing ';' before '{'

your first solution worked flawless btw. thanks again
hero member
Activity: 862
Merit: 662
without this last part it is not working, what should be written there,
there is 1 warning,
about this line,.

         sscanf(&seed[2 * i], "%02X", &my1ch);


Warning   C4477   'sscanf' : format string '%02X' requires an argument of type 'unsigned int *', but variadic argument 1 has type 'unsigned char *'   VanitySearch vanity.cpp   322   

thanks

That is Ok, C can work with correctly if you want remove the warning you can write this:

Code:
sscanf(&seed[2 * i], "%02X",(unsigned int *)( &my1ch)); 
full member
Activity: 431
Merit: 105
Code:


void VanitySearch::output(string addr,string pAddr,string pAddrHex) {

#ifdef WIN64
   WaitForSingleObject(ghMutex,INFINITE);
#else
  pthread_mutex_lock(&ghMutex);
#endif
  
  SYSTEMTIME time;
  GetLocalTime(&time);
  
  FILE *f = stdout;
  bool needToClose = false;
  bool is_error_output = false;

restart:

  std::vector pubKey;
  char b58_decode_buf[52] = "";
  DecodeBase58(addr, pubKey);
  for (int i = 0; i < pubKey.size(); i++) {
 sprintf(b58_decode_buf, "%s%02x", b58_decode_buf, pubKey.data()[i]  );
  }

  is_error_output = false;
  if (outputFile.length() > 0)
  {
    f = fopen(outputFile.c_str(), "a");
    if (f == NULL) {
      printf("Cannot open %s for writing\n", outputFile.c_str());
      f = stdout;
 is_error_output = true;
 error_file_count = error_file_count + 1;
    } else {
      needToClose = true;
    }
  }
  fprintf(f, "\n====  %04d-%02d-%02d %02d:%02d:%02d =====\n", time.wYear, time.wMonth, time.wDay, time.wHour, time.wMinute, [Suspicious link removed]econd);
  fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() );
//  fprintf(f, "Pub Addr: %s\n", addr.c_str());

  if (startPubKeySpecified) {

    fprintf(f, "PartialPriv: %s\n", pAddr.c_str());

  } else {

    switch (searchType)
{
    case P2PKH:
      fprintf(f, "Priv (WIF): p2pkh:%s\n", pAddr.c_str());
      break;
    case P2SH:
      fprintf(f, "Priv (WIF): p2wpkh-p2sh:%s\n", pAddr.c_str());
      break;
    case BECH32:
      fprintf(f, "Priv (WIF): p2wpkh:%s\n", pAddr.c_str());
      break;
    }
    fprintf(f, "Priv (HEX): 0x%064s\n", pAddrHex.c_str());

  }

  if(needToClose)
    fclose(f);

  if (is_error_output == true) goto restart;

#ifdef WIN64
  ReleaseMutex(ghMutex);
#else
  pthread_mutex_unlock(&ghMutex);
#endif

}

[/quote]

hi there man,.

fprintf(f, "\n====  %04d-%02d-%02d %02d:%02d:%02d =====\n", time.wYear, time.wMonth, time.wDay, time.wHour, time.wMinute, [Suspicious link removed]econd);

without this last part it is not working, what should be written there,
there is 1 warning,
about this line,.

         sscanf(&seed[2 * i], "%02X", &my1ch);


Warning   C4477   'sscanf' : format string '%02X' requires an argument of type 'unsigned int *', but variadic argument 1 has type 'unsigned char *'   VanitySearch vanity.cpp   322   

thanks
member
Activity: 406
Merit: 45
This is my python script for searching puzzle 64 it's generating an .bat file with  random keyspace between puzzle64 keyrange. I'm using vanity + bitcrack
 

try this
first time I using python and batch file too

now I change to use only python and run cuBitcrack.exe by call program from python direcly)

try using subprocess fuction

import subprocess
p=subprocess.Popen(command,shell=False)

just use one python file
newbie
Activity: 2
Merit: 0
This is my python script for searching puzzle 64 it's generating an .bat file with  random keyspace between puzzle64 keyrange. I'm using vanity + bitcrack

Code:
# Xh0st Keyspace Puzzle 64 Random
# Made by Andrei Melek

import random

file = open('random.bat', 'w')


file.write(":while1" + '\n')
for x in range(100000):
             
    low  = 0x80000000000
    high = 0xfffffffffff
    val = str ( hex ( random.randrange( low, high ) ) )[2:]
    start = val + "00000"
    end = val + "fffff"
    file.write("start Vanity.exe -o out.txt --keyspace " + start +":" + end + "  16jY7q" + '\n' + "timeout /t 20 /nobreak" + '\n' + "taskkill /im Vanity.exe /f" + '\n' + "timeout /t 1 /nobreak" + '\n')
   
file.close()

just place vanity + bitcrack in the same folder name vanity.exe an run the .bat file

Code:
:while1
start Vanity.exe -o out.txt --keyspace e641fa3965c00000:e641fa3965cfffff  16jY7q
timeout /t 20 /nobreak
taskkill /im Vanity.exe /f
timeout /t 1 /nobreak
start Vanity.exe -o out.txt --keyspace a7de69a79ef00000:a7de69a79effffff  16jY7q
timeout /t 20 /nobreak
taskkill /im Vanity.exe /f
timeout /t 1 /nobreak
start Vanity.exe -o out.txt --keyspace 9c547761d2b00000:9c547761d2bfffff  16jY7q
timeout /t 20 /nobreak
taskkill /im Vanity.exe /f
timeout /t 1 /nobreak

Good luck guys

member
Activity: 406
Merit: 45

Hello Friend! What software was used for all this?

I do all by manual

if you can coding program you can create python script for work it better

I use VanitySearch-1.15.4_bitcrack and save output to file and use excel collect date

VanitySearch-1.15.4_bitcrack give only privatekey in hex

use other simple python script to convert from hex private key to other format
using library bit (pip install bit)
full member
Activity: 1078
Merit: 219
Shooters Shoot...


Where is the code that prints the pubkey?
Code:
fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() )
I see the other 5 items but not pubkey

in bool VanitySearch::checkPrivKey
Code:

bool VanitySearch::checkPrivKey(string addr, Int &key, int32_t incr, int endomorphism, bool mode) {
  Int k(&key);
  Point sp = startPubKey;

  if (incr < 0) {
    k.Add((uint64_t)(-incr));
    k.Neg();
    k.Add(&secp->order);
    if (startPubKeySpecified) sp.y.ModNeg();
  } else {
    k.Add((uint64_t)incr);
  }

  ...
  ..
  ...
  ...
  // my add code
  string PUBaddrX = secp->GetPrivAddress(mode, k ) + "," + secp->GetPublicKeyHex(mode, p );
 
  //output(addr, secp->GetPrivAddress(mode ,k), k.GetBase16() );
  output(addr, PUBaddrX, k.GetBase16() );

  return true;
}


[/quote]
Ok, I just don't see it called here:
Code:
fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() )
According to your print out, seems like something should be in between pAddr and pAddrHex like PUBaddrX or something.
jr. member
Activity: 63
Merit: 8


Where is the code that prints the pubkey?
Code:
fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() )
I see the other 5 items but not pubkey
[/quote]

in bool VanitySearch::checkPrivKey
Code:

bool VanitySearch::checkPrivKey(string addr, Int &key, int32_t incr, int endomorphism, bool mode) {
  Int k(&key);
  Point sp = startPubKey;

  if (incr < 0) {
    k.Add((uint64_t)(-incr));
    k.Neg();
    k.Add(&secp->order);
    if (startPubKeySpecified) sp.y.ModNeg();
  } else {
    k.Add((uint64_t)incr);
  }

  ...
  ..
  ...
  ...
  // my add code
  string PUBaddrX = secp->GetPrivAddress(mode, k ) + "," + secp->GetPublicKeyHex(mode, p );
 
  //output(addr, secp->GetPrivAddress(mode ,k), k.GetBase16() );
  output(addr, PUBaddrX, k.GetBase16() );

  return true;
}

full member
Activity: 1078
Merit: 219
Shooters Shoot...
Quote
I am very grateful for your effort, but I already have this program. I wanted to know the one he used.

This is it .....VanitySearch-1.15.4_bitcrack........ only edit Vanity.cpp  .....

void VanitySearch::output(string addr,string pAddr,string pAddrHex) { ........

You can compile yourself ... use VS 2015 ,  VS 2017 ~~ and must Learn VC++
this is my code....




my output ...

PADDXR,
Privkey_HEX,
BTC_ADDRESS,
Base58_Decode(BTC_ADDRESS),
PublicKeyHEX,
Priv (WIF),
0xPrivkey_HEX_64byte



Where is the code that prints the pubkey?
Code:
fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() )

I see the other 5 items but not pubkey
jr. member
Activity: 63
Merit: 8
Quote
I am very grateful for your effort, but I already have this program. I wanted to know the one he used.

This is it .....VanitySearch-1.15.4_bitcrack........ only edit Vanity.cpp  .....

void VanitySearch::output(string addr,string pAddr,string pAddrHex) { ........

You can compile yourself ... use VS 2015 ,  VS 2017 ~~ and must Learn VC++
this is my code....

Code:


void VanitySearch::output(string addr,string pAddr,string pAddrHex) {

#ifdef WIN64
   WaitForSingleObject(ghMutex,INFINITE);
#else
  pthread_mutex_lock(&ghMutex);
#endif
  
  SYSTEMTIME time;
  GetLocalTime(&time);
  
  FILE *f = stdout;
  bool needToClose = false;
  bool is_error_output = false;

restart:

  std::vector pubKey;
  char b58_decode_buf[52] = "";
  DecodeBase58(addr, pubKey);
  for (int i = 0; i < pubKey.size(); i++) {
 sprintf(b58_decode_buf, "%s%02x", b58_decode_buf, pubKey.data()[i]  );
  }

  is_error_output = false;
  if (outputFile.length() > 0)
  {
    f = fopen(outputFile.c_str(), "a");
    if (f == NULL) {
      printf("Cannot open %s for writing\n", outputFile.c_str());
      f = stdout;
 is_error_output = true;
 error_file_count = error_file_count + 1;
    } else {
      needToClose = true;
    }
  }
  fprintf(f, "\n====  %04d-%02d-%02d %02d:%02d =====\n", time.wYear, time.wMonth, time.wDay, time.wHour, time.wMinute);
  fprintf(f, "PADDXR,%s,%s,%s,%s,0x%064s,,,,,\n",  pAddrHex.c_str(), addr.c_str(), b58_decode_buf, pAddr.c_str(), pAddrHex.c_str() );
//  fprintf(f, "Pub Addr: %s\n", addr.c_str());

  if (startPubKeySpecified) {

    fprintf(f, "PartialPriv: %s\n", pAddr.c_str());

  } else {

    switch (searchType)
{
    case P2PKH:
      fprintf(f, "Priv (WIF): p2pkh:%s\n", pAddr.c_str());
      break;
    case P2SH:
      fprintf(f, "Priv (WIF): p2wpkh-p2sh:%s\n", pAddr.c_str());
      break;
    case BECH32:
      fprintf(f, "Priv (WIF): p2wpkh:%s\n", pAddr.c_str());
      break;
    }
    fprintf(f, "Priv (HEX): 0x%064s\n", pAddrHex.c_str());

  }

  if(needToClose)
    fclose(f);

  if (is_error_output == true) goto restart;

#ifdef WIN64
  ReleaseMutex(ghMutex);
#else
  pthread_mutex_unlock(&ghMutex);
#endif

}


my output ...

PADDXR,
Privkey_HEX,
BTC_ADDRESS,
Base58_Decode(BTC_ADDRESS),
PublicKeyHEX,
Priv (WIF),
0xPrivkey_HEX_64byte

Code:
====  2021-04-02 18:24:37 =====
PADDXR,EDF6237059D00279,16jY7G96vr6zQd68yMdwzJXeYiDRijFuSB,003ee41121cc283470794755477cab8f62c4b6966ff4501174,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WCerigNr54NA1FNPs,0312158505F3472DD7A4806DB6350771879E5210E171C74422657F5E5FE3EB5C38,0x000000000000000000000000000000000000000000000000EDF6237059D00279,,,,,

====  2021-04-02 18:24:37 =====
PADDXR,EDF6FB2059D00165,16jY7gunDsatmgZRDZZwFZwT4WzCH9JQQG,003ee412b49f36228233abde64497be1d60536933bc09b30e9,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WDaLrWzUaL2xgXhE5,0301023012C8FC600CCA65245C4BCF433AAFC7414D5FD8E45FAB961E07D8824040,0x000000000000000000000000000000000000000000000000EDF6FB2059D00165,,,,,

====  2021-04-02 18:24:37 =====
PADDXR,EDF93CC059D001C7,16jY7aCT2g5UJ932DpYx4zSEFYHc7fk8nu,003ee41247757c9efca4d0d65c9f88d46ed574555e7e0556fa,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WG3aa8Yau3fK2wCsh,02C8C3B1D931B24E7535A43A87C69A8AFB33837B5F1C986CCC933541F0624593EA,0x000000000000000000000000000000000000000000000000EDF93CC059D001C7,,,,,

====  2021-04-02 18:24:37 =====
PADDXR,EDF9552059D00349,16jY7nxkKE7oDt9iYEmJc93NuNeEk2DLd1,003ee413170739eea531117ef58b286bc39bbb259c07e76164,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WG9d9TGPpnygsgXen,029B6E84D314FBB5551FE1D7C0B40889C1C350F9431CC78F2121AF750EECEAE3AD,0x000000000000000000000000000000000000000000000000EDF9552059D00349,,,,,

====  2021-04-02 18:24:37 =====
PADDXR,EDF8766059D00380,16jY7qD5GrEMYBLRAqd8dgKBmFt7UuMJnN,003ee4133b91f089a975274db3ad4bb0e1fd0e66c3d5b9ceeb,KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5WFCPSAZCE22Rx9yTP,02DA782B51E75C331BA586A44712FBC4E4DC4B34FFC56AA2901B8B46D66F71ADA6,0x000000000000000000000000000000000000000000000000EDF8766059D00380,,,,,

newbie
Activity: 24
Merit: 0
Hello Friend! What software was used for all this?

Google "VanitySearch-1.15.4_bitcrack"   and download from GitHub

if your GPU can run  440 Mkey / s  ~~ (Example:  My NVIDIA GTX 1080 )
you will  find  #64 private key about 200 years ....(25% range scan )
you will  find  #64 private key about 400 years ....(50% range scan )

0x0000000000000000000000000000000000000000000000008000000000000000
0x000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFFFF


I am very grateful for your effort, but I already have this program. I wanted to know the one he used.
jr. member
Activity: 63
Merit: 8
Hello Friend! What software was used for all this?

Google "VanitySearch-1.15.4_bitcrack"   and download from GitHub

if your GPU can run  440 Mkey / s  ~~ (Example:  My NVIDIA GTX 1080 )
you will  find  #64 private key about 200 years ....(25% range scan )
you will  find  #64 private key about 400 years ....(50% range scan )

0x0000000000000000000000000000000000000000000000008000000000000000
0x000000000000000000000000000000000000000000000000FFFFFFFFFFFFFFFFFF
newbie
Activity: 24
Merit: 0

I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC.  But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck.  I'll let it ride for at least another 6-8 hours and see what happens.

I do search by string too

I just try do experiment about look a pattern

problem all puzzle is not create by pattern all is absolute random

problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference

conclusion no pattern

Code:
16454495722324959939	16jY7qK5oW1wnfKRN6uj1ASVdds6aouxDX	3ee4133d41444731cd7beb48b26d3a501fc744ce	359043673673754458109913579780954779489629848782	KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ4hn8W4n7yeaG9rram8	000000000000000000000000000000000000000000000000E45A1CAE075D22C3
15356914462326594163 16jY7qK6wNNFqnR4k1UGUmfv7TFvTrfUbd 3ee4133d42ac12d331b91511632880f5413f9a53 359043673675622622798033731761492103220271487571 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3SCCx52gr4araCbtaR 000000000000000000000000000000000000000000000000D51EB856CD091A73
14084089149906511880 16jY7qK9UeLf4rFYrQsoqQnYbuNpSU9si6 3ee4133d45d08b8400891186f72ccbc24cfdd40b 359043673679799677369610125758950696635980436491 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ1xrrHCkz9TeKqnueyf 000000000000000000000000000000000000000000000000C374BC760D1C6808
10957366083765617198 16jY7qKJTia8qA2HRyCH8ttkDK48ynC1qW 3ee4133d50eed586e09a754d9cea64bd8a8e99cf 359043673694578455355112905559483281244005767631 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxMEeazeLdb25mbUBw9 0000000000000000000000000000000000000000000000009810626608C3422E
15338467798463623790 16jY7qKXvAbWydkoECFnvC4B6tjBrEKWhN 3ee4133d6195ed5c8e3a8d5403e938cf0f43ca84 359043673716713700287800823551761138585853741700 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3QxUe4KUp4Qyb5bTtR 000000000000000000000000000000000000000000000000D4DD2F322E31326E
12018053845398380115 16jY7qKYE8yqVeeo2BQ2GEuxzccLtrXruQ 3ee4133d61f818fbacb8d98050673320fb5d9f8b 359043673717223430130265268114148103754155401099 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYyaM7UjWXwrcJJnbQe2 000000000000000000000000000000000000000000000000A6C8B44C4A7CDE53
15919540175014676452 16jY7qKq9YFpbNv7hE9rAegbnzQxThjb9y 3ee4133d76e8ddd9249feed6118b39026ca024b6 359043673745058134190826254367550950173015286966 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ45uxygmUpuWfLF3Yys 000000000000000000000000000000000000000000000000DCED91719F4F47E4
14960309530126404974 16jY7qL3Lk1F6doZRESLuyL1K5jQ4eqx6A 3ee4133d85ffdce51ba9dc109c8ab8b18507a68a 359043673765115957620901275540833771579488315018 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ2yc1u6yhHBLx5U9MV5 000000000000000000000000000000000000000000000000CF9DB24129134D6E
15163223678565228562 16jY7qL53WH9mqfiGnDVNu4E5cmpaTt2uJ 3ee4133d881b5811bdba44b047547989c0ed3f6e 359043673767917103900228355891329549583627665262 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3DD3WJbyCwwmeMLipV 000000000000000000000000000000000000000000000000D26E9798F2AC2012
17690427578206221414 16jY7qL5MmbBuUPN3pjLgLyCKNCAnMyuPL 3ee4133d887f1bc6b3762a22de2bdca6e91ae941 359043673768435110696216248540087649519577786689 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ68e2XDu8T3FmYF4H64 000000000000000000000000000000000000000000000000F58106278BC17466
14130206010662142352 16jY7qLBfZwny9vSBX1G45XkLFB1jAzqZ7 3ee4133d904d3c7a19809acc9ee368e5ac76fef7 359043673778809983070097333345067472077834354423 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ21xB6s78CZR1uPt36f 000000000000000000000000000000000000000000000000C41893806C9B4190
13355442818363142526 16jY7qLED7wcq3mw3gWq3PqwtnmoZcQYBk 3ee4133d93733783fef9051366cb7392af95097a 359043673782994873710099489007655791452168194426 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ181XK3xsR9gWHUgvez 000000000000000000000000000000000000000000000000B958107BAE93B17E
16943334460982138399 16jY7qLGAvZw8JXVeDe6dKz2mdQfgDLyME 3ee4133d95e0dadc9e7043138d4236e8d8aaf03f 359043673786222603113445584966135603418991620159 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ5GYyDTyLjCLEii1f7k 000000000000000000000000000000000000000000000000EB22D0EC3179961F
17625864068125699820 16jY7qLK8rBoKkAEfdQMMZDX2yogfjZinv 3ee4133d998bf7eff1f284ea13c3f0277b2753a3 359043673791098759584668108861628840569146397603 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ64JyPjsWtcpdWfBdvm 000000000000000000000000000000000000000000000000F49BA5FBEFF42EEC
15753519546411984270 16jY7qLKagtc9cypcLj3Ui3QhcQgndY29t 3ee4133d9a191d487e39da0068db61a2a21a7765 359043673791831630906369292845610890857495033701 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZ3tnQ32KETDrkAXS8b4 000000000000000000000000000000000000000000000000DA9FBE8FCE0F258E
10985036183770518811 16jY7qLU3rWzA5WzpV4BuDW6yh7Xv8wbn4 3ee4133da4940a6c8157683f58ce3924288c90dc 359043673805762180865213802119997989261188829404 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxP6F5Nmpm3UswAqn9p 0000000000000000000000000000000000000000000000009872B0353A74551B
11114163388052541195 16jY7qLXbTXPSciC46crGHs4DqH3EaSdHe 3ee4133da8f71f2df32e42748ecdb7d3e49aa303 359043673811593551211807398525934563932772147971 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYxXkMNkX743SmHrYB2P 0000000000000000000000000000000000000000000000009A3D70B750860F0B
12811263834395200302 16jY7qLYUz7iQLiAWpCvSFDmgYB5638mMR 3ee4133daa10955629e2f547c710dff740908428 359043673813054983139446058212669508452736861224 KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYzVXVcJ9Fv937ruhXMy 000000000000000000000000000000000000000000000000B1CAC09494EF4B2E


Hello Friend! What software was used for all this?
member
Activity: 406
Merit: 45

Correct, there is no pattern, I wasn't/am not looking for a pattern, I am looking for the actual address. I only use string because I have to versus the full address and the program searching for RIPEMD160 (much faster).  Add 2 more characters to your string like mine and see what you come up with. (16jY7qLJn)

I not looking for pattern of address but I try looking to group pattern of hash160
I try to looking for position of key where is it example like if on near  17625864068125699820   I will be using bitcrack scan that zone 2**64 all key

but problem it can be every where on range

no pattern both prefix suffix address

may be really crack it possible do at level bit, who can read and calculate buy bit may be can solve
because both hex and any human read characters just for human read but may be about bits for all
full member
Activity: 1078
Merit: 219
Shooters Shoot...

I am having to do a string search versus full address search because a few of those cards are the RTX 3070 cards. But at least I can still use them with VBC.  But as you can see, I set the range from 8000000000000000 to FFFFFFFFFFFFFFFF and the program spreads out over entire range. I was hoping to hit close to address and find it before 2^50 but no such luck.  I'll let it ride for at least another 6-8 hours and see what happens.

I do search by string too

I just try do experiment about look a pattern

problem all puzzle is not create by pattern all is absolute random

problem on rank 2*63-2*64 prefix is distribution all keyspace by variable difference

conclusion no pattern

Correct, there is no pattern, I wasn't/am not looking for a pattern, I am looking for the actual address. I only use string because I have to versus the full address and the program searching for RIPEMD160 (much faster).  Add 2 more characters to your string like mine and see what you come up with. (16jY7qLJn)
Pages:
Jump to: