Author

Topic: Private keys posted on Bitcointalk (Read 1039 times)

full member
Activity: 297
Merit: 133
September 07, 2024, 05:32:29 AM
#43
Details of this one item:

WIF uncomp: 5JgC6gcHCkyBqmgbyarpFHBHzpfNkZYKNJA3piM42ZYbvCUc1fW
WIF comp: L11yz5piWu4zrGDoNkSsY2QS2DNP1GdE4ziwTbVWMteV7g7f8RhP
addr uncomp: 1LxPSrR3t8mFLKKsb8W3PxBP77WDmxWPyK
addr comp: 17iXQPBDASPrfN3tQfGEMhBZN3Rreuz6vW
pubkey 130: 04D23B03FFF149F69CC9C5813B1F2F4550DF93E44CE3D2E273C18653A71DF454662805C0F759799 F1E84D4DEAD60F1C4E5C0E023B8916D4FA62C5D02A8F47DD5F5
pubkey 66: 03D23B03FFF149F69CC9C5813B1F2F4550DF93E44CE3D2E273C18653A71DF45466
pvk: 7151048F7EDC2AB2399C0FD0B0DCE404F06231FB8EB44616454D6B2D7EE28876
there was balance - https://www.blockchain.com/explorer/addresses/btc/1LxPSrR3t8mFLKKsb8W3PxBP77WDmxWPyK
no balance - https://www.blockchain.com/explorer/addresses/btc/17iXQPBDASPrfN3tQfGEMhBZN3Rreuz6vW

other addresses:
17iXQPBDASPrfN3tQfGEMhBZN3Rreuz6vW
3QvHnN5f1ky5Yg3tmozee7oeKeLtT2MAyT
bc1p83e0jgs402g4wg86w6h5yjtuk0d8v83wyrchrxu45n8a4nn9tt4sg9gt3c
bc1qfx4nqweynxuts7y98umdgxtqvh0n68d38dqw6y
bc1qmtjqz22jnfeze9nzzqxc0dsr9mk8qw3vw02fcs
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
September 07, 2024, 02:03:14 AM
#42
Code:
addr=1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN
~
From time to time someone sends some sats to this address
We all know "not your keys, not your coins", but some people are just not made for that. Even this year, someone sent $224 to this address. Thanks to full RBF, most of it is burned as miner fees (1,293 sat/vbyte) and whoever drained it only got $21.

If I am not wrong, there are websites that have some private keys being shared or posted because I tried accessing one of it
So you're saying you copied a private key from a website, but you may be wrong that such sites exist? Must reach that signature quotum, right?
I've removed your post. This board is not for discussing centralized shitcoins.
sr. member
Activity: 658
Merit: 387
September 06, 2024, 06:02:31 PM
#41
If I am not wrong, there are websites that have some private keys being shared or posted because I tried accessing one of it (bnb network) and I tried sending a very small amount of bnb to the wallet address that didn't even reach 1 dollar but once it was in the wallet ehen the bnb was transferred right away. Although I have seen it myself but I never knew what they did use or how they monitor the wallet but it is true that leaked private keys are being monitored and in btc, the same thing goes as well.
There are bots that I believe are just built for such activity. I have encountered one myself with a friend's wallet, which got compromised due to his carelessness running after airdrops. Once you make any single deposit to withdraw whatever you have in that wallet, the bot will automatically move the funds over to another wallet, and in most cases all the transactions are sent to just one wallet. 
 
Recently, there is one new but old pattern of scam where the scammer will post their seed phrase online with a good amount of holding on them, and when you try to send a gas fee on whatever network the fund is located, it's either automatically moved out or you can't even move it out yourself because you don't have the complete access key to carry out such a transaction.
hero member
Activity: 1120
Merit: 540
Duelbits - Play for Free | Win for Real
September 06, 2024, 05:04:20 PM
#40
I remember once participating in a discussion on Facebook and a member posted a WIF private key as a joke, when I went to import this private key into Electrum, the server took several minutes to synchronize, as there were more than 800 incoming and outgoing transactions.

When I saw this post, I remembered all the lore surrounding this address, it's a private key of a standard brainwallet, probably with an empty string.

Addr I'm referring to:
Code:
addr=1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN
priv=5KYZdUEo39z3FPrtuX2QbbwGnNP5zTd7yyr2SC1j299sBCnWjss

This is a known address, it's the default example from brainwallet. The person who sent it there either made a donation to the wrong address or made a big mistake, unfortunately.

Since it was probably a mistake, it should be returned, but we all know that doesn't happen (much often...). I guess we live and learn, unfortunately the amount of coins was significant.

This address once received 50BTC, it is not known if it was a donation or a mistake that some unlucky person made.

A blank passphrase creates the following Address/Private key combination.

1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN / 5KYZdUEo39z3FPrtuX2QbbwGnNP5zTd7yyr2SC1j299sBCnWjss

Someone sent 50 BTC today to this 1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN...

https://blockchain.info/tx/65e1ce741c6f756cf0c36b49a59ba77d7aab82b09acde63c4052bbd6bf1c7050

Within 10 minutes it was moved out...

https://blockchain.info/tx/84ef741c9178a62ca405c7addefe3805ac443dcef1ee3051e5a0a18e1a65cc30

From time to time someone sends some sats to this address and it is emptied instantly, it's certainly monitored by monitoring bots.

It could also be someone practicing dusting attacks...
full member
Activity: 297
Merit: 133
September 04, 2024, 07:49:38 PM
#39

...

I'm hoping pbies can tell me where the private key comes from.

...


I am gathering many things related to Bitcoin (WIFs, addresses, pvks, pubkeys, seeds hex, mnemos) and surroundings and as I can recall I was converting addresses<=>WIFs when I stepped into that 5JgC6gcHCkyBqmgbyarpFHBHzpfNkZYKNJA3piM42ZYbvCUc1fW WIF.

As I remember it was some stupid conversion like making WIFs from addresses or the oppostie using Base58Check both ways and so on.

That's all the story.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
December 01, 2023, 10:10:03 AM
#38
Things will get quite interesting once full RBF becomes commonplace. Any such transaction stealing coins from a brain wallet or leaked private key could be replaced by another transaction, regardless of whether or not is opted in to RBF. We could end up seeing different bots broadcasting more and more replacements, each paying a higher and higher fee, trying to steal the coins for themselves. Since there is no incentive for any one such bot to surrender and let another bot win, then such transactions could just escalate until the entire value (or close to it) is paid in fees.
It looks like this is becoming a reality:
https://bitcointalksearch.org/topic/139btc-im-looking-for-the-owner-its-important-5476101
bc1qn3d7vyks0k3fx38xkxazpep8830ttmydwekrnl
IAJdBrmsgwWQU6IFXu1jC77GJuDguNv82ERXT2R8UywQZ7565idpdZpxjWflFVCnrjEfAJC5YcSnQUa jrgdmaZc=

claim 83BTC refund fee from antpool

That's going to be interesting if several people claim to be the real owner. In that case following the coins up the chain and signing a message from one of the earlier addresses will be more convincing.



My take on what happened:
Address bc1qn3d7vyks0k3fx38xkxazpep8830ttmydwekrnl received funds, which were immediately transferred again. That happens to every compromised private key, and many bots must be competing to be the first to steal funds. Usually, they use a high fee. In this case, my guess is that since more and more nodes accept full RBF, this lead to a very high transaction fee. Eventually, miners will get all stolen funds and the "private key hunters" will only be left with crummies. I hope the real owner can convince Antpool he's the real owner, so they don't send it to any of the private key hunters who also have the same private key.
copper member
Activity: 1330
Merit: 899
🖤😏
May 06, 2023, 09:30:29 AM
#37
I knew the puzzles, but didn't catch the upgrade. For who also missed it: this transaction sent about $25 million to these addresses. That makes it worth it to allocate much more processing power to cracking the puzzles.
Crazy Cheesy
Well, It's not about more power, of course anyone could use hundreds of high end GPUs to solve for example #125, the point is to find a way to solve it with the help of mind not silicon. Now that you said it, $25M is too much yet very little to spend for safety analyzing.

I wish I knew how to automate and sort data processing like you, lol I have millions of public keys I just look for collisions with my eyes.🤣
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
May 06, 2023, 07:40:37 AM
#36
I knew the puzzles, but didn't catch the upgrade. For who also missed it: this transaction sent about $25 million to these addresses. That makes it worth it to allocate much more processing power to cracking the puzzles.
Crazy Cheesy
copper member
Activity: 1330
Merit: 899
🖤😏
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
May 06, 2023, 07:17:55 AM
#34
900 bitcoins to puzzle addresses
Link?
copper member
Activity: 1330
Merit: 899
🖤😏
May 06, 2023, 07:12:45 AM
#33
On April 16, someone sent 0.09BTC to an address with publicly known private key. It disappeared instantly with a $12 fee. Someone earned stole $2700 from this.
Yeah, a lot of other things happened that day, for example the same certain someone (Satoshi) sent around 900 bitcoins to puzzle addresses to increase the prize of solving them, and you know how he is, he likes to tip people with Gs, $. 😉
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
May 06, 2023, 06:58:28 AM
#32
On April 16, someone sent 0.09BTC to an address with publicly known private key. It disappeared instantly with a $12 fee. Someone earned stole $2700 from this.
member
Activity: 182
Merit: 35
STRAIGHT FORWARD
April 05, 2023, 07:21:50 AM
#31
good for cold emails
I'm not in the business of spamming people.

Actually.. that is a good reminder and insight. I will make sure we never spam crypto audience.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
April 05, 2023, 06:28:46 AM
#30
good for cold emails
I'm not in the business of spamming people.
member
Activity: 182
Merit: 35
STRAIGHT FORWARD
April 05, 2023, 06:10:07 AM
#29
have you tried collecting all 'email addresses' posted on bitcointalk including the ones in spreadsheets? some of them include emails

it is legal as posted on public and good for cold emails
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
March 11, 2023, 12:37:14 PM
#28
What happens if you send some coins and turn off RBF, only the first thief could get them right?
If you send funds to a compromised address, RBF doesn't matter. The thief uses CPFP and will turn off RBF (in his transaction) to prevent another thief from outbidding him.
copper member
Activity: 1330
Merit: 899
🖤😏
March 11, 2023, 12:27:24 PM
#27
What happens if you send some coins and turn off RBF, only the first thief could get them right?
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
March 11, 2023, 10:30:59 AM
#26
Maybe the same guy who sent the coins to the exposed private key address, he himself swept the coins again. Maybe he's doing that for fun to create drama. Because the coins are swept instantly. Not even a minute after the receiving the coins
Unlikely.
It's much more likely someone did something dumb, and many bots tried to sweep the coins at the same time. One of them was fastest and got the money.
member
Activity: 194
Merit: 14
March 11, 2023, 10:01:34 AM
#25
Yesterday, 1BoatSLRHtKNngkdXEeobR76b53LETtpyT received 0.02429915BTC, which was instantly swept with a 0.001BTC fee.


Maybe the same guy who sent the coins to the exposed private key address, he himself swept the coins again. Maybe he's doing that for fun to create drama. Because the coins are swept instantly. Not even a minute after the receiving the coins
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
March 11, 2023, 02:46:22 AM
#24
Yesterday, 1BoatSLRHtKNngkdXEeobR76b53LETtpyT received 0.02429915BTC, which was instantly swept with a 0.001BTC fee.

I tried something new: I pruned Bitcoin Core to 20 GB, then imported the list of private keys, and did a rescan on the past few months. This shows only the recent transactions, and as a result the wallet is 11 MB instead of 2 GB. Bitcoin Core now works as expected without getting too slow to use.

Right when I wanted to post this, a "fatal error occurred" and Bitcoin Core crashed. The debug.log doesn't make sense:
Code:
ERROR: ProcessNewBlock: AcceptBlock FAILED (System error: filesystem error: cannot create directories: Permission denied [/home/user/.bitcoin/blocks])
~
ForceFlushStateToDisk: failed to flush state (System error while flushing: filesystem error: cannot get free space: No such file or directory [/home/user/.bitcoin/blocks])
After reloading, it works again. I've never seen this before.
hero member
Activity: 700
Merit: 673
February 21, 2023, 11:53:39 AM
#23
Someone who introduced me to this forum explained to me back then how he lost everything just by not being careful enough and posting a private key on the proof of authentication instead of a public address and also making the same mistake on the bounty form. 
Mistakes happens that's when one is not careful enough and sometimes they are also voluntery action where the posted wants peoples attention to the wallet, in some cases they fund the wallet with huge either ERC-20 tokens which will require anyone who want to move the send in some gas fee which will immediately be moved by the original wallet owner. In some cases, they are addresses, which make use of more than just a phrase to authorize outgoing transactions. I don't know how they do that, though.
Scrolling through the transactions, it's obvious any incoming transaction instantly gets sweeped, usually at a high fee.
I believe in the case of this nature, it's a mistakenly posted wallet, which has many eyes on it, and because of the constant transactions, lots of bots might have been installed to move out all confirmed transactions immediately. 
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 21, 2023, 10:30:08 AM
#22
All they really care about is a way of maintaining a well connected mempool in order to quickly receive any newly broadcast transactions. For each incoming transaction, they will presumably have something like a huge lookup table database
I hadn't realized this until you posted it. It makes sense, and they don't even need the mempool anymore, all they need to check is every new transaction the moment it first arrives. So that's at most 7-ish transactions per second, or better: every xxx milliseconds a new transaction arrives, and they check them instantly (one at a time).
Kinda like BitBonkers, but with sweeping instead of visualizing.
legendary
Activity: 2268
Merit: 18711
February 21, 2023, 05:59:00 AM
#21
Those servers run by hackers who snatch coins that are sent to known private keys must have databases of many millions of addresses, I wonder if they run custom code that is much faster than Core because of its more narrow purpose.
Almost certainly. They don't need a wallet in core, and indeed, they don't even need a full node. A pruned node would suffice. They don't care about blocks or historical transactions at all - by the time a transaction is in a block it is already too late for them to steal. All they really care about is a way of maintaining a well connected mempool in order to quickly receive any newly broadcast transactions. For each incoming transaction, they will presumably have something like a huge lookup table database combined with one or more bloom filters so they can as quickly as possible determine if they have the private key for each address.
legendary
Activity: 3024
Merit: 2148
February 20, 2023, 05:39:18 PM
#20
Every few minutes, Bitcoin Core is unresponsive for a few minutes, most likely because of the large wallet combined with a lack of processing power. It's not very nice to work with, and consumes 1 full CPU core.

That's interesting, I thought Bitcoin Core would be more efficient and effortlessly check new transactions in both mempool and new blocks for the addresses in the wallet with some fast search structure.

Those servers run by hackers who snatch coins that are sent to known private keys must have databases of many millions of addresses, I wonder if they run custom code that is much faster than Core because of its more narrow purpose.
legendary
Activity: 2268
Merit: 18711
February 20, 2023, 01:56:52 PM
#19
I am surprised to read this. What kind of systems are these? How are they able to monitor if a private key is leaked or not.
They will trawl forums like this one, Reddit, Twitter, etc., on the hunt for private keys which have been shared. Then they import those private keys in to their software, which generates the corresponding addresses and watches them for any incoming transactions.

Other sources of private keys they could import include hacked cloud storage, hacked password manager databases, hacked email accounts, brain wallets, and so on.

& how does it recognize the gibberish code as pvt key anyways?
Simply search for any 51 character string beginning with "5", or 52 character string beginning with "K" or "L".
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 20, 2023, 12:12:26 PM
#18
I am surprised to read this. What kind of systems are these?
I'm not sure. I guess it's some customized wallet software.

There is a way that you can make money with them, if they are old keys and moved coins in the past, then you can get clam coins with those keys.
Clams aren't worth much anymore. And I'm pretty sure someone thought of claiming them already Wink

Quote
And another fun way to make money with that list is by selling it in one of those services that let you sell files or compressed folders for cryptos. For sure some users would be interested in buying that list.
Good point. They're probably being sold already.
legendary
Activity: 3346
Merit: 3125
February 20, 2023, 12:02:35 PM
#17
It was a nice experiment, I know there were some public "private keys" on this forum but never think they were that big amount.

There is a way that you can make money with them, if they are old keys and moved coins in the past, then you can get clam coins with those keys. You can use the service on Just-Dice for that, or install the core and make the swap direct from there.

And another fun way to make money with that list is by selling it in one of those services that let you sell files or compressed folders for cryptos. For sure some users would be interested in buying that list.
hero member
Activity: 2114
Merit: 603
February 20, 2023, 12:00:41 PM
#16
This is interesting. As regular user of crypto I would have never imagined that there is stuff like this. In fact this was new learning for me and made me think I should be extra cautious about my private keys. Anyways, I am guy who after creating an address would think thrice which key is to be shared to public and which one not even when they mention in BOLD which one is private key and public key. Idk, there might be many of such users out there doing the same thing to avoid what has happened / mentioned in the OP.

I assume many people have systems monitoring all compromised private keys, and they're competing against each other to steal the funds before someone else does. Back in the days, it happened to large amounts of Bitcoins, but the more recent transactions are mostly small. Except for last month (January 24): this address received 0.84362383BTC, which was instantly sweeped. The private key was posted 2 months earlier:

I am surprised to read this. What kind of systems are these? How are they able to monitor if a private key is leaked or not. Its confusing to understand and it should be known to everyone so that I won't be making the mistake of leaking my private key by accident.

For example, whether it is phishing sites, or a software downloaded from play store, or any browser extension? What kind of monitor? & how does it recognize the gibberish code as pvt key anyways?
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 20, 2023, 11:14:35 AM
#15
is it possible to see statistics or a graph of the number of posts with an exposed private key over a period of time? is the trend decreasing or are we talking about wallet security here in vain?
That's not going to be easy without manual checks. Many people post keys knowing they're compromised already, or they're partial private keys for (secure) vanity address generation. Many keys gets posted more than once (or quoted), and I don't really want to check 10k+ posts.
legendary
Activity: 2268
Merit: 18711
February 20, 2023, 11:05:24 AM
#14
-snip-
I agree with Loyce. If you are already running a device 24/7 anyway to host a node, then it costs you nothing to have a script running on that device watching a database of compromised addresses and waiting to sweep any funds which appear. And when we occasionally see transactions like the one Loyce mentioned of ~0.84 BTC, or the one in the post I linked to above of almost 1 BTC, that is more than enough incentive for several people to continually run bots. Each individual will be hoping that their database contains unique addresses, or even actively seeking out unique brain wallets or less common sources of compromised keys.
legendary
Activity: 3472
Merit: 3507
Crypto Swap Exchange
February 20, 2023, 10:58:47 AM
#13
considering that there is a lot and more and more talk about security, there are warnings everywhere, "keep safe your PK" or "not your key not your coins", now I'm interested in how effective such a campaign really is.
is it possible to see statistics or a graph of the number of posts with an exposed private key over a period of time? is the trend decreasing or are we talking about wallet security here in vain?
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 20, 2023, 10:57:34 AM
#12
I was curious about that scenario too. That would mean that (eventually) only miners profit from funds sent to addresses with leaked private keys.
After a while it makes you wonder if it could actually work the other way. More and more people stop running the bots since it really does become pointless and they are slowly forgotten about.
No, that can't happen. Just one bot is enough to take the money, and if nobody runs it, someone will. If it's profitable for one person, someone else will do the same. So even if some people stop their bots, others will join.
It's never going to change: once a private key is compromised, funds will disappear.

Quote
Yes in theory this is 'free money' just by running a script. But the 1st time they go to consolidate all the dust they have since fees ate the rest do they just walk away.
Not all transactions are dust.
legendary
Activity: 3500
Merit: 6320
Crypto Swap Exchange
February 20, 2023, 10:37:14 AM
#11
I was curious about that scenario too. That would mean that (eventually) only miners profit from funds sent to addresses with leaked private keys.

After a while it makes you wonder if it could actually work the other way. More and more people stop running the bots since it really does become pointless and they are slowly forgotten about.
Kind of like the way junk fax senders have been disappearing. Just no work / no profit and more and more people pursuing legal action against them. They just left the field.

Yes in theory this is 'free money' just by running a script. But the 1st time they go to consolidate all the dust they have since fees ate the rest do they just walk away.

-Dave
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 20, 2023, 05:51:12 AM
#10
I've made such mistake some years ago when I was really new to crypto. I wanted to send someone my wallet address and I mistakenly sent him my private keys
I once entered my private key in a Google search field. It's such a common thing to do: "CTRL-V > Enter", and it's gone. The best way to prevent this is by making sure you can't make this mistake: never handle private keys on a system that's connected to the internet.

Things will get quite interesting once full RBF becomes commonplace. Any such transaction stealing coins from a brain wallet or leaked private key could be replaced by another transaction, regardless of whether or not is opted in to RBF or not. We could end up seeing different bots broadcasting more and more replacements, each paying a higher and higher fee, trying to steal the coins for themselves. Since there is no incentive for any one such bot to surrender and let another bot win, then such transactions could just escalate until the entire value (or close to it) is paid in fees.
I was curious about that scenario too. That would mean that (eventually) only miners profit from funds sent to addresses with leaked private keys.
legendary
Activity: 2268
Merit: 18711
February 20, 2023, 05:40:02 AM
#9
I assume many people have systems monitoring all compromised private keys, and they're competing against each other to steal the funds before someone else does.
This is definitely the case. I remember a few years ago looking more closely at coins being sent to brain wallets being stolen - https://bitcointalksearch.org/topic/m.46603379. In short, within only one or two seconds of a transaction being made to a brain wallet, there are multiple competing transactions detected by different nodes attempting to sweep the coins to another address. And bear in mind that as soon as a node has seen one such non-RBFed transaction, it will reject all others, meaning that although we may only see 3 or 4 such transactions across the entire network, there are likely many more than that which are being rejected. Given that we know there are multiple bots running with huge databases of addresses from brain wallets, it is only logical to assume their databases also include all leaked private keys and seed phrases they can find as well.

Things will get quite interesting once full RBF becomes commonplace. Any such transaction stealing coins from a brain wallet or leaked private key could be replaced by another transaction, regardless of whether or not is opted in to RBF. We could end up seeing different bots broadcasting more and more replacements, each paying a higher and higher fee, trying to steal the coins for themselves. Since there is no incentive for any one such bot to surrender and let another bot win, then such transactions could just escalate until the entire value (or close to it) is paid in fees.
legendary
Activity: 2870
Merit: 7490
Crypto Swap Exchange
February 20, 2023, 05:38:51 AM
#8
This morning, Bitcoin Core was hanging. I killed it, restarted it, and it took forever to load the wallet (which had grown to 2.2 GB during the rescan).

FYI, Bitcoin Core load whole wallet to RAM which may be reason of long loading time[1].

I think that the number is bigger, since some have posted them as images which you could not "scan".
My list is indeed not complete. I didn't search for Hex keys either, only WIF.

And with HEX, i expect you'll receive many false positive since 64 character HEX also mentioned as hash of a file, as block hash, as TXID or explaining SHA-256.

Coming from a newbie account? It may be intentional, some greedy members will want to outsmart the poster but the smart will get hunted in the end, I don't go after people's private keys or recovery seeds when I see them online, I believe no one is stupid enough to post them online, they did it to lure greedy people.

That doesn't make sense. Bitcoin don't have smart contract which can be used to perform scam through sharing recovery/mnemonic words.

[1] https://bitcointalksearch.org/topic/m.60252176
sr. member
Activity: 658
Merit: 441
February 20, 2023, 05:29:05 AM
#7
Don't try to be smart by creating a brain wallet!
I've made such mistake some years ago when I was really new to crypto. I wanted to send someone my wallet address and I mistakenly sent him my private keys and I was lucky I noticed it before the recipient got the message. I quickly had to transfer my funds to a different wallet and forfeited that very wallet.

It is advisable to always have a clear head when performing sensitive transactions to avoid making costly mistakes.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 20, 2023, 05:17:30 AM
#6
I believe no one is stupid enough to post them online
Did you click the first 2 words of this topic?
sr. member
Activity: 686
Merit: 403
February 20, 2023, 05:14:25 AM
#5
Coming from a newbie account? It may be intentional, some greedy members will want to outsmart the poster but the smart will get hunted in the end, I don't go after people's private keys or recovery seeds when I see them online, I believe no one is stupid enough to post them online, they did it to lure greedy people.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
February 20, 2023, 04:51:26 AM
#4
I wonder if the forks get claimed at the same time too or if you checked any of them (similar to what neurotic said, an ethereum private key can look similar to a bitcoin one).

for some addresses the number of transactions was too big and the Electrum servers were cutting me off

I think they scan in advance to see how big your wallet gets (somehow) or at least decide to load a certain number of addresses (via a tree) and decide if the tree is too big to process or not (whatever it is, it's kept those servers very fast).

legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 20, 2023, 04:41:43 AM
#3
I think that the number is bigger, since some have posted them as images which you could not "scan".
My list is indeed not complete. I didn't search for Hex keys either, only WIF.

Quote
in some cases I remember there was a scam spree of posting "by mistake" ETH private keys for wallets
I didn't search for altcoin private keys.

Quote
for some addresses the number of transactions was too big and the Electrum servers were cutting me off
That must be why the wallet grew to 2.2 GB. With just private keys, it was only a few MB.
legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
February 20, 2023, 04:31:29 AM
#2
I searched all downloaded posts (which took hours) for anything that could be a Bitcoin private key. That resulted in 9375 potential keys (not all of them are valid, and no, I won't post the list).

I think that the number is bigger, since some have posted them as images which you could not "scan".

Even more, in some cases I remember there was a scam spree of posting "by mistake" ETH private keys for wallets containing tokens and no ETH. Obviously, at funding a smart contract was sending the ETH away.
So it was not only mistakes.

Yesterday, I imported the private keys into a new Bitcoin Core wallet (this took only a few minutes), and did a rescan (which took forever, but was mesmerizing to watch: the balance went up and down by many Bitcoins, and this kept going for hours! I left it to finish overnight.
This morning, Bitcoin Core was hanging. I killed it, restarted it, and it took forever to load the wallet (which had grown to 2.2 GB during the rescan). Eventually, it worked!

Impressive! I've intended a similar test some years ago with Electrum (my set was much smaller and I don't even remember if I've done my test with keys or just addresses). But for some addresses the number of transactions was too big and the Electrum servers were cutting me off (I knew less back then). So I've abandoned the idea of watching those. However, I've noticed even back then that even if some addresses were known to be leaked and unsafe, some people still were playing with them long afterwards (by funding with small amounts). But I was not aware of huge mistakes like that 0.84BTC... wow...
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
February 20, 2023, 04:10:15 AM
#1
This post made me curious: how many private keys have been posted on Bitcointalk?
To find out, I searched all downloaded posts (which took hours) for anything that could be a Bitcoin private key. That resulted in 9375 potential keys (not all of them are valid, and no, I won't post the list).
Yesterday, I imported the private keys into a new Bitcoin Core wallet (this took only a few minutes), and did a rescan. This took forever, but was mesmerizing to watch: the balance went up and down by many Bitcoins, and this kept going for hours! I left it to finish overnight.
This morning, Bitcoin Core was hanging. I killed it, restarted it, and it took forever to load the wallet (which had grown to 2.2 GB during the rescan). Eventually, it worked! It's up to date, and the total balance is 0 (as expected). Every few minutes, Bitcoin Core is unresponsive for a few minutes, most likely because of the large wallet combined with a lack of processing power. It's not very nice to work with, and consumes 1 full CPU core.

Scrolling through the transactions, it's obvious any incoming transaction instantly gets sweeped, usually at a high fee. I assume many people have systems monitoring all compromised private keys, and they're competing against each other to steal the funds before someone else does. Back in the days, it happened to large amounts of Bitcoins, but the more recent transactions are mostly small. Except for last month (January 24): this address received 0.84362383BTC, which was instantly sweeped. The private key was posted 2 months earlier:
according to my notes the private key for that address can be: 5JgC6gcHCkyBqmgbyarpFHBHzpfNkZYKNJA3piM42ZYbvCUc1fW
Someone made a very expensive mistake funding it. I'm hoping pbies can tell me where the private key comes from.

TL;DR
Don't post your private keys! Don't post your seed phrases! Don't try to be smart by creating a brain wallet!

No spam
Self-moderated against spam. Discussion is of course allowed.
Jump to: