Pages:
Author

Topic: VanBitCracken - a program to use for 32 BTC challenge (supports RTX 30xx cards) (Read 5382 times)

full member
Activity: 1162
Merit: 237
Shooters Shoot...
Hi your program is phenomenal and works really well.

I have a question: If it is already a pure random search by default inside a specific range, what is the point of using -rKey in this case inside a range?

The normal RotorCuda, KeyHuntCuda are sequential and when -rKey was used and triggered the starting base key changed and restarted the sequential.

I ask this question because when approaching the -Rkey there is the usual drop in performance that recovers after about 20-30 seconds as also happens with KeyHunt, RotorCuda ectect...

so if it's already random I wanted to avoid using it (-rKey).

But I'm waiting for your explanatory answer since it's not possible to view the source code.

Thanks in advance.

Code:
./VBCrLinux -t 0 -gpu -gpuId 0,1,2,3,4,5,6,7,8,9 -g 2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128 -o Lucky.txt -dis 1 -r 100000 --range 40000000000000000:80000000000000000 1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9


The program will generate random starting points within the supplied range, and then works sequentially, from each random starting point. By using the -r (rekey) flag, the program rekeys new random starting points, every x amount of keys checked. If you do not use the -r flag, then the program will just search from the initial random starting points, forever / until you restart the program.
So random just generates random starting points for each CPU/GPU thread, the -r tells it to generate new random starting points every x amount of keys.
?
Activity: -
Merit: -
Hi your program is phenomenal and works really well.

I have a question: If it is already a pure random search by default inside a specific range, what is the point of using -rKey in this case inside a range?

The normal RotorCuda, KeyHuntCuda are sequential and when -rKey was used and triggered the starting base key changed and restarted the sequential.

I ask this question because when approaching the -Rkey there is the usual drop in performance that recovers after about 20-30 seconds as also happens with KeyHunt, RotorCuda ectect...

so if it's already random I wanted to avoid using it (-rKey).

But I'm waiting for your explanatory answer since it's not possible to view the source code.

Thanks in advance.

Code:
./VBCrLinux -t 0 -gpu -gpuId 0,1,2,3,4,5,6,7,8,9 -g 2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128,2048,128 -o Lucky.txt -dis 1 -r 100000 --range 40000000000000000:80000000000000000 1BY8GQbnueYofwSuFAT3USAhGjPrkxDdW9

full member
Activity: 1162
Merit: 237
Shooters Shoot...
Please Help

./VBCrLinux -t 0 -gpu -gpuId 0 -begr f7051ffff0000000 -endr f7051fffffffffff -stop -dis 1 16jY7qLJnxb7CHZyqBP8qca9d51gA
VBCr v3.01
 Search For: 16jY7qLJnxb7CHZyqBP8qca9d51gA [Compressed]
 Started on: Tue Nov  5 19:05:45 2024
  Beg Range: F7051FFFF0000000 (64 bit)
  End Range: F7051FFFFFFFFFFF (64 bit)
  Rng Width: FFFFFFF (28 bit)
CPU Threads: 0
GPU: GPU #0 NVIDIA GeForce RTX 3080 (68x128 cores) Grid(544x128)
 [ 00:00:19][Total 2089.65 MK/s][GPU 2089.65 MK/s][Keys 38,432,407,552][Found 0][Rekeys: 0]

I'm doing a test program but it doesn't stop at the end of the range, why? what am I doing wrong?
I tried different ranges, calculated this one, it keeps counting too.

f7051001ffffffffff
f7051fff10000000
17 579 569 577 985
It is random, not sequential. It will never stop.
newbie
Activity: 10
Merit: 0
Please Help

./VBCrLinux -t 0 -gpu -gpuId 0 -begr f7051ffff0000000 -endr f7051fffffffffff -stop -dis 1 16jY7qLJnxb7CHZyqBP8qca9d51gA
VBCr v3.01
 Search For: 16jY7qLJnxb7CHZyqBP8qca9d51gA [Compressed]
 Started on: Tue Nov  5 19:05:45 2024
  Beg Range: F7051FFFF0000000 (64 bit)
  End Range: F7051FFFFFFFFFFF (64 bit)
  Rng Width: FFFFFFF (28 bit)
CPU Threads: 0
GPU: GPU #0 NVIDIA GeForce RTX 3080 (68x128 cores) Grid(544x128)
 [ 00:00:19][Total 2089.65 MK/s][GPU 2089.65 MK/s][Keys 38,432,407,552][Found 0][Rekeys: 0]

I'm doing a test program but it doesn't stop at the end of the range, why? what am I doing wrong?
I tried different ranges, calculated this one, it keeps counting too.

f7051001ffffffffff
f7051fff10000000
17 579 569 577 985
newbie
Activity: 23
Merit: 2
3 days of searching only found 3 addresses starting with 13zb1hQb, while finding more than 200 addresses starting with 13zb1hQ.
My first 13zb1hQb is in 203c0df74e49 next one is in 401f8aa ( lol was testing ). Third one is in 3b650e1d66a7.
I can't really tell how rare those are considering I'm using random mode. Have you found any of those rare addresses yet? Could this mean that 13zb1hQbW when found is the only address in the entire range? Maybe I'm wrong given the small ranges I have searched.
I am only searching full address, not partial string.

I used to know how to try and figure out how many leading characters in address could be in a specific range.

Maybe someone else can answer better/more accurate.

Take number of characters, minus the leading 1, 13zb1hQbW has 8 characters. Multiply that by base 58 to the power of characters; 58^8 = 128,063,081,718,016. Now divide range size by that. 2^65 / 58^8 = 288,088. So there could be up to 288,000 addresses starting with 13zb1hQbW in the #66 range.

Based on your calculations, i found a prefix that only repeats 4967 times in the entire 66 puzzle range: 13zb1hQbWV

Is my math correct?
Yes, if my math above was correct lol

Just came across this. Bummer, I thought I was making progress because I've found 4 13zb1hQbWV prefixes, but now that I see there's potentially almost 5k of them in 66's range, I feel like I've accomplished nothing!
newbie
Activity: 7
Merit: 0

I would like to know if I can modify the exe file from either bitcrack, VanBitCracken or VBCr to perform my search or is there another program?
This tool is not open source, even if it was you couldn't modify exe file, first you need to modify the source code and recompile it to make a new exe. This dev is no longer among us unfortunately, he left these woods a couple of month ago.

At first I was just like you, I thought I could hit a key by "chance" until I got to know about public keys, if you are interested in hunting for puzzles, join us in a futile search for them.😂

Ps, I hope you are not going to post the same thing in every brute force related topic.😉  welcome and happy hunting.

Pss, check my python museum on this same board, I have the ultimate cracking scripts.🙃



Hello again hahaha
I will not publish in more posts, I only published it in the previous post that I just responded to you and in this, the two posts where I saw that I could get precise answers Smiley

I'll check your wall in a while and let you know if I find anything interesting, although I'm sure I will.

Thank you !! I will take your help into account and although I don't have much knowledge about these things and I am learning, here is a friend to chat with and try to help us with whatever you need.
copper member
Activity: 1330
Merit: 899
🖤😏

I would like to know if I can modify the exe file from either bitcrack, VanBitCracken or VBCr to perform my search or is there another program?
This tool is not open source, even if it was you couldn't modify exe file, first you need to modify the source code and recompile it to make a new exe. This dev is no longer among us unfortunately, he left these woods a couple of month ago.

At first I was just like you, I thought I could hit a key by "chance" until I got to know about public keys, if you are interested in hunting for puzzles, join us in a futile search for them.😂

Ps, I hope you are not going to post the same thing in every brute force related topic.😉  welcome and happy hunting.

Pss, check my python museum on this same board, I have the ultimate cracking scripts.🙃
newbie
Activity: 7
Merit: 0
Good afternoon, I hope everything is well.

My idea is the following:

I have a BTC.txt file, which has all addresses with a balance greater than 0 starting with 1 (both compressed and uncompressed) (BTC.TXT IS 19 GB AND has 1 btc address in each line)

I want to run bitcrack, VanBitCracken or VBCr which work perfectly, but when I put -i btc.txt, in bitcrack it stays loading for about 6 hours and is removed, and in VanBitCracken and VBCr it doesn't seem to read it directly

I would like to know if I can modify the exe file from either bitcrack, VanBitCracken or VBCr to perform my search or is there another program?


PS: Create a code in python that more or less does the following:

Creates a random 32 byte hex key, then converts it to its respective WIF key both compressed and decompressed, then checks if the compressed and decompressed address of that address matches any address in btc.txt, if so it saves it to found. txt, if it does not find anything it will continue searching until it finds a match OR until it stops the program. What I mean is that in python I have achieved my goal and I would like to do the same but with my gpu

This is the result of my python file WITHOUT GPU and using 4 processors out of 16:

Generated: 20400000 (SHA-256 - HEX)
Last generated key in hexadecimal: 13d0f03fab9c75a97fa6492b8b832b0ce7b11b8cc30f25e8eb1164b9fbc57ded
Compressed Bitcoin address: 1LZfGfy88QjBVkB3DTqpjFwonStb93Bed4
Decompressed Bitcoin address: 1DUXqLAJch8pncVKf63HZBefaKT3b81p5E
Generation rate: 4497.490059165694 keys per second

Generated: 20500000 (SHA-256 - HEX)
Last key generated in hexadecimal: f55599ce4720d4061894e644b99e190ffebb758c7780572e43651e9d622c2f69
Compressed Bitcoin address: 1Nr4BuyWgxS6Bmd4WzUZrkRFZHM6FQcqXp
Decompressed Bitcoin address: 1FgYyC5RAQwr8AUqHH7CP7Sx52avAJYtb
Generation rate: 4572.502992815531 keys per second



PS: I am aware of the difficulty and luck it takes to get 1 match that is very very very unlikely, but I know what I want and that is it Smiley



Excuse my English, I am from BCN (SPAIN) and I only speak Spanish and Catalan, so my English is translated
copper member
Activity: 1330
Merit: 899
🖤😏
Suddenly, the older version of VanBitCrackenS1.exe, which is a compiled executable, stops functioning, and the 10-12 MB exe file suddenly becomes 0 MB. I download the new version from GitHub (compiled exe of VanBitCrackenS v1.1). Everything is the same as it was in the old version. After a few days, whenever addresses are found, a separate text file is created named keys.found.txt, even though I had already specified -o found.txt along with its path. So the question is, has this software been compiled in such a way that any feature can be added or removed at any time, as I have experienced, which is a terrifying experience. Shocked Shocked Huh
What do you mean you downloaded the new version? did you see any changes in repository? Because that would make it "a new version" but if the file wasn't changed then it's not a new version looking the same, it's the same old one, besides how exactly an executable file is reduced to 0MB but still exist, I have never seen a file with a no size, it should at least show some size. Also I have never seen a file delete itself.

Anyways, I don't even have the found keys command set but when it finds an address it creates the text file named keysfound.txt by default. My cracker is also untouched.😉
member
Activity: 275
Merit: 20
the right steps towerds the goal
Suddenly, the older version of VanBitCrackenS1.exe, which is a compiled executable, stops functioning, and the 10-12 MB exe file suddenly becomes 0 MB. I download the new version from GitHub (compiled exe of VanBitCrackenS v1.1). Everything is the same as it was in the old version. After a few days, whenever addresses are found, a separate text file is created named keys.found.txt, even though I had already specified -o found.txt along with its path. So the question is, has this software been compiled in such a way that any feature can be added or removed at any time, as I have experienced, which is a terrifying experience. Shocked Shocked Huh
newbie
Activity: 5
Merit: 0
is vbcr checks for patterns in a  range randomly , or it increments the hexadecimal start range by 1 ??
copper member
Activity: 1330
Merit: 899
🖤😏
how to check balance? or if someone has a script to extract to a separate txt pub address walett
You don't need to check for balance, you are already searching for addresses with balance. Not that it matters, because you'd need to grind 10 trillion keys a second for a few thousand years to find one of the smallest puzzle keys.
newbie
Activity: 1
Merit: 0
Here is VBCRandom in action.
Batch file settings:
Code:
VBCRandom -t 0 -gpu -gpuId 0 -topr 8000000000000000 -subr 48 -r 480 --keyspace 8000000000000000:FFFFFFFFFFFFFFFF -o randomtest.txt 16jY7q

Results:

Code:
Started Sat Aug 28 12:32:28 2021
Start Range  :  8000000000000000
End   Range  :  FFFFFFFFFFFFFFFF
Searching For:  16jY7q
Compression  :  Compressed
CPU threads  :  0
GPU          :  GPU #0 NVIDIA GeForce GTX 1060 6GB (10x128 cores) Grid(80x512)

Random Key   :  800007AC8B3D5525
Random Key   :  8000201C33F5235B
Random Key   :  8000E2F090E63C7D
 [00:00:04 Run Time ] [Speed 82.524 MK/s] [Total Keys: 335,544,320] [# Rekeys: 0] [Found: 2]
Random Key   :  8000208FB1B474F6
Random Key   :  8000B9FC61E9ABA1
Random Key   :  8000F0310FBE3DD2
 [00:00:08 Run Time ] [Speed 82.563 MK/s] [Total Keys: 671,088,640] [# Rekeys: 1] [Found: 4]
Random Key   :  80004698D58E9E8F
Random Key   :  800089612D96CDA0
Random Key   :  8000C2190CD91261
 [00:00:15 Run Time ] [Speed 81.609 MK/s] [Total Keys: 1,258,291,200] [# Rekeys: 2] [Found: 6]
Random Key   :  800043E67DBAB51D
Random Key   :  800098B29829B7A7
Random Key   :  800045B53E8E1753
 [00:00:20 Run Time ] [Speed 79.286 MK/s] [Total Keys: 1,593,835,520] [# Rekeys: 2] [Found: 6]

Key results:
Code:
Pub Addr: 16jY7qzxujzi1K7GaEc17ZFokFymagY3jG
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLz94bU7Lw952JxZUX
Priv (HEX): 0x000000000000000000000000000000000000000000000000800015BE8DF950C5

Pub Addr: 16jY7qdry8xB4v6JeMH2R3ViVTSTzDGv2B
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLzUZ1qwKHqCmVgPRj
Priv (HEX): 0x000000000000000000000000000000000000000000000000800064574E06912E

Pub Addr: 16jY7qwSUyCss5jZYDjgJofLe7KgKxiCQo
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLzGCmCHBUm9fupLgz
Priv (HEX): 0x0000000000000000000000000000000000000000000000008000328A78D70051

Pub Addr: 16jY7q7x9EjwysPAYtappeDX6Lqtm32ekf
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLzCiYnMdjWKzRsXUn
Priv (HEX): 0x0000000000000000000000000000000000000000000000008000247B3183BFDC

Pub Addr: 16jY7qTWTgUzCEEH7E9UFxVKALnvCcykwV
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLziDMQ1SzkL55t52w
Priv (HEX): 0x00000000000000000000000000000000000000000000000080009B6E64AE0CAD

Pub Addr: 16jY7qwSwoyaH2NT2dKsY15h11Gma5bccb
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLzSjUdaY9XWkAo8pE
Priv (HEX): 0x00000000000000000000000000000000000000000000000080005D00CB38A1B5

Pub Addr: 16jY7qCNptT19yStBa3tgVFy2k7CvhLi8t
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvM13ZD8mLPHJMsj9c6
Priv (HEX): 0x0000000000000000000000000000000000000000000000008000E96EBB6FFC70

Pub Addr: 16jY7q3WZumGZ4gbrDTSte9JTbhEniZpqP
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLzLQVfZGJ81tzYnbi
Priv (HEX): 0x0000000000000000000000000000000000000000000000008000437CBF9A4063

Pub Addr: 16jY7qSaxGdCNribBnf6oxcpaw7aBUA6nN
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLzMkoUUXmUpiqDSm1
Priv (HEX): 0x000000000000000000000000000000000000000000000000800048EE90360155

Pub Addr: 16jY7qSV4qyaXJNmwWCu2t4DRWHuTnQuwz
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLz9toCoHuQiZuBD2p
Priv (HEX): 0x000000000000000000000000000000000000000000000000800019188671357A

Pub Addr: 16jY7qJ3MdatyubzBQ4e67n5D2iJRqFrDY
Priv (WIF): p2pkh:KwDiBf89QgGbjEhKnhXJuH7LrciVrZi3qYvLzZLFmMZj3v26fWhh
Priv (HEX): 0x0000000000000000000000000000000000000000000000008000779DFF73D53B

See how every new random key is within the same 48 bit range? Now you could change the -topr to whatever toprange and the -subr to whatever subrange. If in the example above you wanted to search every possible range in the toprange of 8000000000000000, you would use -topr 8000000000000000 and -subr 60.

Make sense?

use the -b for compressed and uncompressed.

Do you know any script or program that will check the list of private keys? balance?


how to check balance? or if someone has a script to extract to a separate txt pub address walett
newbie
Activity: 74
Merit: 0
Hi tested program in small and highe ranges nut somtimes it keeps search on same key and to repeat them https://ibb.co/4fxkJDQ if i keep track will not scan again same keys in random mode?
full member
Activity: 1162
Merit: 237
Shooters Shoot...
it scans random keys within a range.


How much random keys? 4 showed or more depends on grid?
Correct. It is based on grid size, but only 4 will show, to limit the display text.
copper member
Activity: 55
Merit: 0
Builder of big stable mining farms since 2011.
it scans random keys within a range.


How much random keys? 4 showed or more depends on grid?
copper member
Activity: 55
Merit: 0
Builder of big stable mining farms since 2011.
I don't know how is it possible but the "VanBitCrackenRandom2" is exactly doing what I want to do. You are reading my mind! Thank you so much.
full member
Activity: 1162
Merit: 237
Shooters Shoot...
hi, is there any chance to make new change in program and after it scan random that range scanned keys to not be scanned again?
Yo yo...andiu! The program doesn't scan a range, it scans random keys within a range.

If you are wanting to keep track of the ranges you randomly search in, python or a batch file is best used in this situation.
newbie
Activity: 74
Merit: 0
hi, is there any chance to make new change in program and after it scan random that range scanned keys to not be scanned again?
member
Activity: 185
Merit: 15
Two things you should never abandon: Family & BTC


Quote
WanderingPhilospher

Prefix search works on all address types except for bc1p .. any workaround for this or not?
Pages:
Jump to: