'00008657895489568954e6270000ffffffff000049924a526a523a520a52198c'
What is this? where it comes from?
I checked it in some hexadecimal editor and there is no a message there:
Can you add some more of context please?
It was the Bitcointalk forum that inspired us to create Bitcointalksearch.org - Bitcointalk is an excellent site that should be the default page for anybody dealing in cryptocurrency, since it is a virtual gold-mine of data. However, our experience and user feedback led us create our site; Bitcointalk's search is slow, and difficult to get the results you need, because you need to log in first to find anything useful - furthermore, there are rate limiters for their search functionality.
The aim of our project is to create a faster website that yields more results and faster without having to create an account and eliminate the need to log in - your personal data, therefore, will never be in jeopardy since we are not asking for any of your data and you don't need to provide them to use our site with all of its capabilities.
We created this website with the sole purpose of users being able to search quickly and efficiently in the field of cryptocurrency so they will have access to the latest and most accurate information and thereby assisting the crypto-community at large.
import random, sys, os, time
from datetime import datetime, timedelta
import secp256k1 as ice
from concurrent.futures import ThreadPoolExecutor
os.system("clear")
t = time.ctime()
sys.stdout.write("\033[01;33m")
sys.stdout.write(f"[+] {t}" + "\n")
sys.stdout.flush()
# Define the check_private_key function
def check_private_key(dec, add_set):
while True:
dec = random.randint(min_number, max_number)
HASH160 = ice.privatekey_to_h160(0, True, dec).hex()
sys.stdout.write("\033[01;33m")
sys.stdout.write(f"\r[+] {HASH160}" + "\r")
sys.stdout.flush()
if HASH160 == add_set:
dec_to_hex = hex(dec).split('x')[-1]
HASH160_wif = ice.btc_pvk_to_wif(dec)
print('\n')
print(f" Key Found: |\033[32m {dec_to_hex} \033[0m")
print(f" WIF |\033[32m {HASH160_wif} \033[0m")
print(f" Address |\033[32m {add_set} \033[0m")
with open("FOUND_66PUZZLE.txt", "a") as f:
f.write("HEX: " + str(dec_to_hex) + '\n' + "Address HASH160: " + str(add_set) + '\n' + "Private Key: " + str(HASH160_wif) + '\n')
f.flush()
f.close()
return
# Specify the start and end date and times
start_datetime = datetime(2014, 1, 1, 0, 0, 0)
end_datetime = datetime(2015, 1, 15, 19, 7, 14)
# Calculate the time range in seconds
time_range_seconds = (end_datetime - start_datetime).total_seconds()
# Define the range of numbers and Hash 160
min_number = 36893488147419103232
max_number = 73786976294838206463
add_set = "20d45a6a762535700ce9e0b216e31994335db8a5"
# Initialize a ThreadPoolExecutor
executor = ThreadPoolExecutor(max_workers=10)
current_datetime = start_datetime
while current_datetime <= end_datetime:
# Format the current datetime to exclude fractional seconds
timestamp = current_datetime.strftime('%Y-%m-%d %H:%M:%S')
# Convert the formatted timestamp to a Unix timestamp
timestamp = int(datetime.strptime(timestamp, '%Y-%m-%d %H:%M:%S').timestamp())
# Initialize the random number generator with the timestamp
random.seed(timestamp)
# Generate a random number within the specified range
dec = random.randint(min_number, max_number)
# Submit the check_private_key function as a task to the ThreadPoolExecutor
future = executor.submit(check_private_key, dec, add_set)
# Check if the generated private key matches the provided address
if future.result():
executor.shutdown()
break # Exit the loop if a match is found
# Increment the current datetime by one second for the next timestamp
current_datetime += timedelta(seconds=1)
====================================
linuxtime: 4573737217
Puzzle 1
Private Key : 0x1
Timestamp: 2114-12-08 21:33:37
====================================
linuxtime: 4576602332
Puzzle 2
Private Key : 0x3
Timestamp: 2115-01-11 01:25:32
====================================
linuxtime: 4576602332
Puzzle 3
Private Key : 0x7
Timestamp: 2115-01-11 01:25:32
====================================
linuxtime: 4571281403
Puzzle 4
Private Key : 0x8
Timestamp: 2114-11-10 11:23:23
====================================
linuxtime: 4575384117
Puzzle 5
Private Key : 0x15
Timestamp: 2114-12-27 23:01:57
====================================
linuxtime: 4576538378
Puzzle 6
Private Key : 0x31
Timestamp: 2115-01-10 07:39:38
====================================
linuxtime: 4571025590
Puzzle 7
Private Key : 0x4c
Timestamp: 2114-11-07 12:19:50
====================================
linuxtime: 4570872102
Puzzle 10
Private Key : 0x202
Timestamp: 2114-11-05 17:41:42
====================================
linuxtime: 4576802823
Puzzle 8
Private Key : 0xe0
Timestamp: 2115-01-13 09:07:03
====================================
linuxtime: 4574581413
Puzzle 13
Private Key : 0x1460
Timestamp: 2114-12-18 16:03:33
====================================
linuxtime: 4571991458
Puzzle 12
Private Key : 0xa7b
Timestamp: 2114-11-18 16:37:38
====================================
linuxtime: 4575374435
Puzzle 9
Private Key : 0x1d3
Timestamp: 2114-12-27 20:20:35
====================================
linuxtime: 4570872160
Puzzle 11
Private Key : 0x483
Timestamp: 2114-11-05 17:42:40
====================================
linuxtime: 4575758239
Puzzle 15
Private Key : 0x68f3
Timestamp: 2115-01-01 06:57:19
====================================
linuxtime: 4572100404
Puzzle 14
Private Key : 0x2930
Timestamp: 2114-11-19 22:53:24
====================================
linuxtime: 4573632515
Puzzle 20
Private Key : 0xd2c55
Timestamp: 2114-12-07 16:28:35
====================================
import random
from datetime import datetime, timedelta
# Specify the start and end date and times
start_datetime_pre = datetime(2015, 1, 1, 0, 0, 0)
end_datetime_pre = datetime(2015, 1, 15, 19, 7, 14)
# Define the range of numbers
min_number = 18446744073709551615
max_number = 36893488147419103231
# Specify the target number
target_number = 30568377312064202855
# Specify the target pattern
target_pattern = '305683'
current_datetime = start_datetime_pre
time_step = timedelta(seconds=1)
while current_datetime <= end_datetime_pre:
# Calculate the time range in seconds
time_range_seconds = 1
# Initialize binary search boundaries
low_timestamp = int(current_datetime.timestamp())
high_timestamp = int(current_datetime.timestamp())
found_datetime = None # Initialize found_datetime
while low_timestamp <= high_timestamp:
# Calculate the middle timestamp
mid_timestamp = (low_timestamp + high_timestamp) // 2
# Use the middle timestamp as the seed to generate a number
random.seed(mid_timestamp)
generated_number = random.randint(min_number, max_number)
# Check if the generated number starts with the specified pattern
if str(generated_number).startswith(target_pattern):
found_datetime = datetime.fromtimestamp(mid_timestamp)
break # Break out of the inner loop when a match is found
if generated_number < target_number:
low_timestamp = mid_timestamp + 1
else:
high_timestamp = mid_timestamp - 1
if found_datetime is not None:
print("Pattern Found:", generated_number, "Found Timestamp:", found_datetime.strftime('%Y-%m-%d %H:%M:%S'))
# Increment the current datetime by one second for the next timestamp
current_datetime += time_step