Pages:
Author

Topic: == Bitcoin challenge transaction: ~1000 BTC total bounty to solvers! ==UPDATED== - page 5. (Read 54326 times)

member
Activity: 245
Merit: 17

Hi

1) Suppose I find pvk for puzzle #64
2) I import the bitcoin address 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN
3) I start a full fund transfer to another wallet
4) My transaction shows up in the blockchain (showing number of confirmations)
5) Once my transaction has been launched, the publickey is then visible.

My question is as follow:
Is it possible for someone using "Pollard's kangaroo ECDLP solver" to find the private key fast enough to be able to import the same address 16jY7qLJnxb7CHZyqBP8qca9d51gAjyXQN and then launch  a fund transfer
 to a different wallet ? (before enough confirmation on my transaction and of course pay more gas fees than me)   

Huh

-----------------------------------------------------------------------------------------------------------------------------
Glad that some of you are concerned by what I mentionned 3 years ago  !
newbie
Activity: 23
Merit: 2
If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...

The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool.

It won't actually be seen at all through the mempool.

https://i.postimg.cc/pTmPGBWN/2024-08-04-10-01.png
Interesting, as I'm not in the key hunting business, I didn't know about https://slipstream.mara.com/ yet. Thanks for pointing me to it. They seem to charge about double the current fee level (as of writing this post mempool.space indicated 5 sat/vB and Slipstream asks for a minimum fee of 10 sat/vB; I expected worse).

I've read their ToS briefly and it seems at first glance that indeed they claim your submitted transaction remains "confidential" until mined into a block by their own pool.

One can only hope that slipstream.mara.com are really honest and do not exploit the internal disclosure of the public key themselves. I heard that mara.com does attract some critisism, at minimum as far as I recognized for censoring certain transactions which got tagged as "not appropriate". Can't say anything how reliable they are when at minimum 6.6BTC are at stake.

WP did a test with slipstream and it didn't leak the public key to the mempool for the bots to intercept, so it seems like they mean what they say. As far as Mara not mining some transactions, it MIGHT have something to do with them being a publicly traded US based company subject to the Dept. of Treasury's Office of Foreign Asset Control (OFAC) regulations. OFAC maintains a list of "sanctioned" wallet addresses that they don't like, and if you're a US person / company and you interact with one of these sanctioned wallets (including mining a block which spends funds from a sanctioned wallet) then you can expect up to a $1M fine and 20 years jail time. https://ofac.treasury.gov/media/8551/download?inline
hero member
Activity: 862
Merit: 662
I don't understand people that setup multi-tens of GB stuff via BSGS to crack it in minutes, it makes no sense. Keep it simple.

Some people don't have GPU, some of them don't even know what they are doing
newbie
Activity: 15
Merit: 0
Do you know how the previous solver of puzzle 64 claimed his reward with just transaction fee of BTC 0.00063 while MARA isn't available yet and there also exists of bots out there back then?

Because most likely it wasn't worth it to set up bots since the reward was relatively small, so no one really cared.

Puzzle 66 can be cracked in less than 0.5 seconds (500 milliseconds) once the pubkey is revealed. One only needs a modest setup for that as well: a database of precomputed Tame DPs (less than a couple of GB, can be preloaded in RAM) and a low-budget GPU with a fast-returning execution kernel to find a couple of Wild DPs. Match with a Tame DP is basically instant. I don't understand people that setup multi-tens of GB stuff via BSGS to crack it in minutes, it makes no sense. Keep it simple.

Anything over 10K $ is a good motivation for bots!
member
Activity: 165
Merit: 26
Do you know how the previous solver of puzzle 64 claimed his reward with just transaction fee of BTC 0.00063 while MARA isn't available yet and there also exists of bots out there back then?

Because most likely it wasn't worth it to set up bots since the reward was relatively small, so no one really cared.

Puzzle 66 can be cracked in less than 0.5 seconds (500 milliseconds) once the pubkey is revealed. One only needs a modest setup for that as well: a database of precomputed Tame DPs (less than a couple of GB, can be preloaded in RAM) and a low-budget GPU with a fast-returning execution kernel to find a couple of Wild DPs. Match with a Tame DP is basically instant. I don't understand people that setup multi-tens of GB stuff via BSGS to crack it in minutes, it makes no sense. Keep it simple.
newbie
Activity: 1
Merit: 0

It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX.

In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.

There are so many bots set up running hunting for the public key of 66. Wouldn't it already be the case where each of the bot will keep appending an extra input to the TX till it reaches 100% of the reward as a fee?   



The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool.

It won't actually be seen at all through the mempool.


Do you know how the previous solver of puzzle 64 claimed his reward with just transaction fee of BTC 0.00063 while MARA isn't available yet and there also exists of bots out there back then?
hero member
Activity: 714
Merit: 1010
Crypto Swap Exchange
If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...

The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool.

It won't actually be seen at all through the mempool.


Interesting, as I'm not in the key hunting business, I didn't know about https://slipstream.mara.com/ yet. Thanks for pointing me to it. They seem to charge about double the current fee level (as of writing this post mempool.space indicated 5 sat/vB and Slipstream asks for a minimum fee of 10 sat/vB; I expected worse).

I've read their ToS briefly and it seems at first glance that indeed they claim your submitted transaction remains "confidential" until mined into a block by their own pool.

One can only hope that slipstream.mara.com are really honest and do not exploit the internal disclosure of the public key themselves. I heard that mara.com does attract some critisism, at minimum as far as I recognized for censoring certain transactions which got tagged as "not appropriate". Can't say anything how reliable they are when at minimum 6.6BTC are at stake.
member
Activity: 499
Merit: 38

The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool.

It won't actually be seen at all through the mempool.



Yes. And they tell me that I am hallucinating that this is possible...  Grin
jr. member
Activity: 42
Merit: 0
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



 It's a blast to solve Puzzle 65, 66, 67, 68.  It takes about 60 seconds once we identify the public key from the blockchain.  

Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe


root@puzzle ~/Test # time python3 toddler_puzzle_bot.py
Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
Endomorphism enabled
Threads : 12
Search compress only
Quiet thread output
K factor 4096
Mode BSGS sequential
Opening file 65.txt
Added 1 points from file
Bit Range 65
-- from : 0x10000000000000000
-- to   : 0x20000000000000000
N = 0x100000000000
Bloom filter for 17179869184 elements : 58890.60 MB
Bloom filter for 536870912 elements : 1840.33 MB
Bloom filter for 16777216 elements : 57.51 MB
Allocating 256.00 MB for 16777216 bP Points
Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done!
Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done!
Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done!
Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done!
Thread Key found privkey 1a838b13505b26867  
Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b
All points were found
Private Key: 1a838b13505b26867
WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57
Starting Electrum ....
starting daemon (PID 41802)
true
Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe
Transaction IDs: []
Daemon stopped
Electrum daemon stopped successfully.

real   2m46.311s
user   1m55.133s
sys   0m59.598s


and the time required to import the key into Electrum and start the redirection of transactions (if they exist ).

The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has
entered the mempool and remains 'Pending,' waiting for confirmation.

It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which
you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool.  

In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in
one (or less than) minute for puzzle 66, 67, 68, 69.

Are you replying to me, or just randomly hallucinating? What is the purpose of your writing?

If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...

The only way to do that is by using the MARA Pool Slipstream. The transaction will be mined before the public key enters the mempool.

It won't actually be seen at all through the mempool.

newbie
Activity: 8
Merit: 0
If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...

You mean that the Public Key will become visible to everyone BEFORE the bitcoins have moved to the new bitcoin address?
Is this what you are saying?
Will someone be able to beat my transaction and have his trasaction go thru before mine?
jr. member
Activity: 115
Merit: 1
Better to stick to the higher range keys then. 130 and up.

130+ with public tools is ridiculously unefficient.
jr. member
Activity: 50
Merit: 30

Hey,

hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?

Thank you!

It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX.

In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.

Better to stick to the higher range keys then. 130 and up.
hero member
Activity: 862
Merit: 662

Hey,

hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?

Thank you!

It is a lose-lose example in my case the bot will keep increment 1sat/vB more than your or anyone else TX.

In the final round in case to reach the limit of the input balance it will append an extra input to the TX and send 100% of the puzzle address as fee.
newbie
Activity: 1
Merit: 0

If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...

Hey,

hypothetically i find the key, submit tx transaction with 0.1BTC going to my address and pay fee of 6.5 BTC. How do you steal my transaction ?

Thank you!
newbie
Activity: 23
Merit: 2
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



 It's a blast to solve Puzzle 65, 66, 67, 68.  It takes about 60 seconds once we identify the public key from the blockchain.  

Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe


root@puzzle ~/Test # time python3 toddler_puzzle_bot.py
Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
Endomorphism enabled
Threads : 12
Search compress only
Quiet thread output
K factor 4096
Mode BSGS sequential
Opening file 65.txt
Added 1 points from file
Bit Range 65
-- from : 0x10000000000000000
-- to   : 0x20000000000000000
N = 0x100000000000
Bloom filter for 17179869184 elements : 58890.60 MB
Bloom filter for 536870912 elements : 1840.33 MB
Bloom filter for 16777216 elements : 57.51 MB
Allocating 256.00 MB for 16777216 bP Points
Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done!
Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done!
Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done!
Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done!
Thread Key found privkey 1a838b13505b26867  
Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b
All points were found
Private Key: 1a838b13505b26867
WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57
Starting Electrum ....
starting daemon (PID 41802)
true
Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe
Transaction IDs: []
Daemon stopped
Electrum daemon stopped successfully.

real   2m46.311s
user   1m55.133s
sys   0m59.598s


and the time required to import the key into Electrum and start the redirection of transactions (if they exist ).

The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has
entered the mempool and remains 'Pending,' waiting for confirmation.

It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which
you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool.  

In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in
one (or less than) minute for puzzle 66, 67, 68, 69.

Are you replying to me, or just randomly hallucinating? What is the purpose of your writing?

If (hypothetically) you found the private key for puzzle 66, and simply tried to spend puzzle 66's BTC balance to another wallet that you control, you better hope that that transaction gets mined into the next block
within a few seconds, or it will be stolen with 100% certainty. This is also the case for the next few puzzles, 67,68,69...
jr. member
Activity: 50
Merit: 30
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



Mining has nothing to do with obtaining the privkey, once its loaded and sent to a new address the next transaction in line will pick it up and you will obtain ownership. The alt coins however would be left intact and easily breakable for first come first serve. I know for a fact If I managed to break a puzzle I would not be worried about the small alt coin addresses, I am sure someone could sweep them all at once but I dont have time for that.

Also a address without a outgoing TX does not have its public key exposed. Once coins are sent from a address the pubkey is leaked because the network needs it for verification to send the coins. The pubkey can easliy be cracked with tools listed here. So once someone sweeps BTC from say puzzle 66 the pubkey is now exposed. BSGS can now be used to crack the privkey in minutes or less. The reason puzzles 66 and up are still not broken is because the pubkey is not known. The creator knowningly sent small amounts of coins on other puzzles to expose some of the pubkeys. Puzzles 120, 125, 130, 135 ect. Maybe for fun who knows.

Again, Miners have nothing to do with solving the puzzle. If 2 people were to try to send the coins at the same time for some reason on the same block, 1 transaction would reject depending on that tx in the mempool, and the exact time it was sent. The miner speed would be the same for both of them as the blocks get solved 1 at a time. The network will attemp a target time "usually a minute" for each block to get solved by adjusting difficuilty based on current net hash rate, its not perfect but a sudden ramp up in hash rate will only solve a few blocks before the difficuilty adjusts to correct the solving speed.
newbie
Activity: 8
Merit: 0
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



 It's a blast to solve Puzzle 65, 66, 67, 68.  It takes about 60 seconds once we identify the public key from the blockchain.  

Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe


root@puzzle ~/Test # time python3 toddler_puzzle_bot.py
Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
Endomorphism enabled
Threads : 12
Search compress only
Quiet thread output
K factor 4096
Mode BSGS sequential
Opening file 65.txt
Added 1 points from file
Bit Range 65
-- from : 0x10000000000000000
-- to   : 0x20000000000000000
N = 0x100000000000
Bloom filter for 17179869184 elements : 58890.60 MB
Bloom filter for 536870912 elements : 1840.33 MB
Bloom filter for 16777216 elements : 57.51 MB
Allocating 256.00 MB for 16777216 bP Points
Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done!
Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done!
Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done!
Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done!
Thread Key found privkey 1a838b13505b26867  
Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b
All points were found
Private Key: 1a838b13505b26867
WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57
Starting Electrum ....
starting daemon (PID 41802)
true
Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe
Transaction IDs: []
Daemon stopped
Electrum daemon stopped successfully.

real   2m46.311s
user   1m55.133s
sys   0m59.598s


and the time required to import the key into Electrum and start the redirection of transactions (if they exist ).

The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has
entered the mempool and remains 'Pending,' waiting for confirmation.

It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which
you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool.  

In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in
one (or less than) minute for puzzle 66, 67, 68, 69.

Are you replying to me, or just randomly hallucinating? What is the purpose of your writing?
member
Activity: 499
Merit: 38
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?



 It's a blast to solve Puzzle 65, 66, 67, 68.  It takes about 60 seconds once we identify the public key from the blockchain.  

Here i tested my toddler bot script on Puzzle 65 = address -> 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe


root@puzzle ~/Test # time python3 toddler_puzzle_bot.py
Version 0.2.230519 Satoshi Quest, developed by AlbertoBSD
Endomorphism enabled
Threads : 12
Search compress only
Quiet thread output
K factor 4096
Mode BSGS sequential
Opening file 65.txt
Added 1 points from file
Bit Range 65
-- from : 0x10000000000000000
-- to   : 0x20000000000000000
N = 0x100000000000
Bloom filter for 17179869184 elements : 58890.60 MB
Bloom filter for 536870912 elements : 1840.33 MB
Bloom filter for 16777216 elements : 57.51 MB
Allocating 256.00 MB for 16777216 bP Points
Reading bloom filter from file keyhunt_bsgs_4_17179869184.blm .... Done!
Reading bloom filter from file keyhunt_bsgs_6_536870912.blm .... Done!
Reading bP Table from file keyhunt_bsgs_2_16777216.tbl .... Done!
Reading bloom filter from file keyhunt_bsgs_7_16777216.blm .... Done!
Thread Key found privkey 1a838b13505b26867  
Publickey 0230210c23b1a047bc9bdbb13448e67deddc108946de6de639bcc75d47c0216b1b
All points were found
Private Key: 1a838b13505b26867
WIF Key: KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qZM21gaY8WN2CdwnTG57
Starting Electrum ....
starting daemon (PID 41802)
true
Keypair imported: 18ZMbwUFLMHoZBbfpCjUJQTCMCbktshgpe
Transaction IDs: []
Daemon stopped
Electrum daemon stopped successfully.

real   2m46.311s
user   1m55.133s
sys   0m59.598s


and the time required to import the key into Electrum and start the redirection of transactions (if they exist ).

The 10 minutes is the average time and this is a pretty stupid circumstance. At this stage, the transaction has
entered the mempool and remains 'Pending,' waiting for confirmation.

It only takes a matter of seconds (for such a small range) to obtain the private key from public key, after which
you (or a thousand of them) can replace the still-unconfirmed transaction in the mempool.  

In other words, you need a very strong miner to speed up (prioritize) the transaction to go through the mempool in
one (or less than) minute for puzzle 66, 67, 68, 69.
newbie
Activity: 8
Merit: 0
So, has anyone figured out a bulletproof way to spend puzzle 66's inputs, once the key is found, without the internet-of-bots stealing the prize? Other than trying to find a big enough mining pool that will mine your transaction into a block and not expose the transaction to the mempool? Could any mining pool even be trusted to that extent?

I cant belive that I read this BS again on this forum. Are you out of your mind? Why the hell do you need a mining pool?HuhHuhHuh
I have read a similar BS from another user in another topic, that is talking about miners.

You dont need any miners to get the money, when you got the privatekey, you can immediately take control of the bitcoins. Do you really dont know how?

full member
Activity: 1162
Merit: 237
Shooters Shoot...
Hi Guys
Im playing around with bitcoin puzzles , currently with VanBitCrackenRandom2 by scanning ranges and I think there is something not right or im missing something....
I need a tool which allows me to scan full ranges from my database.
With above software there is no indication when / if range has been completely scanned .
Even if I use small range which can be fully searched in seconds program is still looking for new keys good know where.

Can someone recommend any software ( gpu ) where I can specify in cmd start of the range and end of the range where I can get indication that range scan has been completed.

Currently Im using command:

VBCr -t 1 -gpu -gpuId 0 -g 2046,512 -bits 66 -dis 1  -begr 2000000000000000 -endr 3FFFFFFFFFFFFFFFF -r 210000 -o 66BitChallengeKey.txt 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so

And I dont even think command is right as when switching to micro  ranges its doing constant scan even if test keys are fund....

When I run this for:

VBCr -t 20  -dis 1  -begr 3FFFFFFFFFFFFFEFF -endr 3FFFFFFFFFFFFFFFF -r 1 -o aaa.txt 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT
where 1Eo3WvHuWKcjcuA6R8KAPFWkNwMEa2WRvT has a PK WIF of KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qaCyWMw1qH2rzy6joVM6 from 3FFFFFFFFFFFFFFFF  its running all the time after the key is found regardless if I use -r flag or not...
Thanks in advance...
Hi, I modded VBCr, it is as its name states, random. It will not progress through a range.
Also, you have a very low rekey rate in your second command line. This will cause the program to basically always rekey to new random points.

There are plenty of programs out there that will do what you are wanting to do, especially if you are searching for a full length address.

https://github.com/WanderingPhilosopher/VanBitCrakcenS
https://github.com/WanderingPhilosopher/KeyHuntCudaClient
or any other Keyhunt-Cuda program on GitHub, or Rotor-Cuda

or an oldie but goodie
https://github.com/Telariust/VanitySearch-bitcrack/releases

Hope that helps...
Pages:
Jump to: