Hello
Inspired by recent discussions about brainwallets (
https://bitcointalksearch.org/topic/checking-brainwallet-5396293) and (
https://bitcointalksearch.org/topic/m.60015668) I decided to repeat the famous excercise of retrieving 18k brainwallets. It was an interesting experience to build a GPU program for that purpose.
I have used list of used addresses for 8th of May (
http://alladdresses.loyce.club/all_Bitcoin_addresses_ever_used_sorted.txt.gz) and database of 15462473182 passphrases "all_in_one_p" (
https://weakpass.com/all-in-one). I was also considering using extended list of phrases (the one which contains unprintable/special characters) but finally I decided that maybe I will do it later. Because of number of target addresses and memory limitations I had to launch program several times, using each time 30mln addresses for a bloom filter - larger database would make the whole process 3 times longer and I did not expect very different results.
For now, results are only for legacy addresses, today or tomorrow I will launch the same search but for p2sh and bech32 addresses. I am not sure if we may expect any significant number of results.
Results so far: 18995 addresses. I did not check each of them, but from what I observed, many of them were emptied in 2016.
Address 12AKRNHpFhDSBDD9rSn74VAzZSL3774PxQ from phrase "1" is still alive
and probably used by bots.
I have uploaded the results there:
https://github.com/PawelGorny/BrainwalletsPhrasesIf you see strange/suspicious phrase in "legacy_words.txt", try to find it in the file "legacy_results.txt", to see if it was not a address or privkey incorrectly extracted. Unfortunately, for some compresses addresses I have lost the phrase (I had a bug during saving to file, around 20% of compressed addresses has no phrase) - but WIF is there.