Bitcoin Forum
January 06, 2026, 04:27:52 PM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 [572] 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 ... 624 »
  Print  
Author Topic: Bitcoin puzzle transaction ~32 BTC prize to who solves it  (Read 361472 times)
SimonNeedsBitcoin
Newbie
*
Offline Offline

Activity: 16
Merit: 0


View Profile
August 09, 2025, 04:48:31 AM
 #11421

How do you know the winner is transferring and broadcasting the fund? Do you get the public key immediately after the winner broadcast the transation? Does this take time?

Yes. In about 10-20 seconds you will be left with nothing.

It takes less than 2 seconds to break the private key of Puzzle 71 (once the initial TX is in the mempool), create the TX, and broadcast it, and to get it accepted by any miner.


The principle behind the puzzle bot can be explained more simply:

The bot checks a Bitcoin address for incoming transactions using a Python script.

If a transaction is found, it extracts the public key from the scriptsig field in the transaction input.

Example one-line Python command for puzzle 71:

Code:
python3 -c "import requests; import sys; address = sys.argv[1]; url = f'https://mempool.space/api/address/{address}/txs/chain'; r = requests.get(url); txs = r.json(); pubkey = next((vin['scriptsig'][-66:] for tx in txs for vin in tx['vin'] if 'scriptsig' in vin), None); print(f'Public key for address {address}: {pubkey}' if pubkey else 'Public key not found');" 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU

If the public key is found, it will appear like this:

Quote
Public key for address 197kFKvMHoRJPXktc8xJwMjeTuE9xijBQ: 029fd3d2479a37f40d03975cb51ce0fa18cbb709cc46b47caeaa1722cfd3683583

If not, it will return:
Quote
Public key not found

You can manually press Enter repeatedly until the public key appears.

Alternatively, you can automate it with a Python script that checks every 5 seconds indefinitely.

The public key will appear as soon as someone broadcasts a transaction from that address.

Faster Execution with a Local Node

If you're running a local Bitcoin node (e.g., with Umbrel), you can query your own mempool instead of an external API:

Code:
url = f'http://mempool.localhost/api/address/{address}/txs/chain'

This reduces latency and speeds up detection.

Once the public key is obtained, Kangaroo is used to derive the private key, typically in 2-3 seconds.

The script then replaces the original transaction in the mempool before it gets confirmed.

Example:
Quote
bitcoin-cli createrawtransaction 'INPUTS' 'OUTPUTS'
bitcoin-cli signrawtransactionwithkey 'HEX' '["PRIVATE_KEY"]'
bitcoin-cli sendrawtransaction 'SIGNED_HEX'


No Rate Limits: Local mempool API is faster and unrestricted.

Real-Time Detection: Sees transactions as soon as they enter the mempool.


Thank you for your detailed explanation. It seems that this kind of robot can really steal the bonus very quickly. Although I don’t believe it can be done in 2 seconds, it seems that it can be done within a minute or even tens of seconds. Broadcasting in a public mining pool is indeed very dangerous.
Igor_cherkassy
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
August 09, 2025, 08:33:16 AM
 #11422

Can anyone share any key to 1PWo3JeB9jr.... Thanks.
mahmood1356
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
August 09, 2025, 09:07:47 AM
 #11423

Can anyone share any key to 1PWo3JeB9jr.... Thanks.
649a103b78b3e74856
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 221


View Profile
August 09, 2025, 09:19:55 AM
 #11424

It seems that this kind of robot can really steal the bonus very quickly. Although I don’t believe it can be done in 2 seconds, it seems that it can be done within a minute or even tens of seconds. Broadcasting in a public mining pool is indeed very dangerous.

Good, progress.

Now, let's take it one step forward.

Having the pubKey of Puzzle #71 means solving the ECDLP in a 70-bits interval.

Algorithms such as BSGS or Kangaroo will thus require around 2**36 EC group operations, when starting from a zero setup.

Let's take RCKangaroo as a base reference (just for example sake, it is NOT an optimized solver).

With that demo program, an RTX 4090 can do around 8 Gop/s EC (group operations per second).

So, the ECDLP will be broken in around 8.5 seconds.

Let's now actually take it one step further and solve it much faster than that.

If you investigate why the ECDLP of a 70-bit interval is solved in only 2 * 2**35 steps, you will notice that 2**35 of those steps start off from a known private key. So the solving equation can be expressed like this:

intervalSize = numRequiredOpsA * numRequiredOpsB
(example: 2**70 = 2**35 * 2**35)

where you can twiggle around with the right-hand numbers.

Mathematically, the optimal (minimal) effort occurs when those two numbers have the same magnitude, because that is when the sum of the numbers is at a minimum.

However, if one wants to accelerate the solving by trading off the initial effort, we can rewrite things like this:

intervalSize = bigNumberA * smallNumberB
(example: 2**70 = 2**70 * 1)

In this example, somebody precomputes and stores all the keys of the interval, and when the public key becomes available, then the solving side only takes one step (a lookup).

D. J. Bernstein wrote a great paper on how we can take advantage of this in the ECDLP context. It turns out, that we can do something like this if we want:

bigNumberA = 2**40
smallNumberB = 2**30

In this example, we can spend a decent amount of time working out and storing data for whatever 2**40 private keys that we wish. Once we have this data prepared, when the public key is revealed, we'd only need 2**30 steps to find the associated private key.

Now, let's revisit the solve times, on a RTX 4090 (just for fun):

Precomputing time: 2**40 steps = 138 seconds
Solving time: 2**30 steps = 0.13 seconds

Maybe this should make people understand why puzzles 71 to 100+ are basically sitting ducks, and can be solved in a matter of minutes (in total).

Off the grid, training pigeons to broadcast signed messages.
MrGPBit
Jr. Member
*
Offline Offline

Activity: 51
Merit: 1


View Profile
August 09, 2025, 09:33:30 AM
 #11425

Can anyone share any key to 1PWo3JeB9jr.... Thanks.
649a103b78b3e74856

Public Addr: 1PWo3JeB9jRLz2NjTHsZ8uTBnqcjnu66Ak

Unfortunately, the letter R is capitalized and does not match the destination address
viljy
Legendary
*
Offline Offline

Activity: 2324
Merit: 1704



View Profile
August 09, 2025, 03:00:24 PM
 #11426

~
D. J. Bernstein wrote a great paper on how we can take advantage of this in the ECDLP context. It turns out, that we can do something like this if we want:

bigNumberA = 2**40
smallNumberB = 2**30

In this example, we can spend a decent amount of time working out and storing data for whatever 2**40 private keys that we wish. Once we have this data prepared, when the public key is revealed, we'd only need 2**30 steps to find the associated private key.

Now, let's revisit the solve times, on a RTX 4090 (just for fun):

Precomputing time: 2**40 steps = 138 seconds
Solving time: 2**30 steps = 0.13 seconds

Maybe this should make people understand why puzzles 71 to 100+ are basically sitting ducks, and can be solved in a matter of minutes (in total).

An interesting idea. And it's actually so simple, and very clever. I sometimes read threads about the puzzle, I even searched for private keys before, until I saw that you can hardly do without large financial costs.


P.S. As for the 71 range, I don't see a bot problem at all if the person who found the key uses Mara so that the transaction doesn't end up in the mempool.


███████▄▄███▄███▄
███▄▄████████▌██
▄█████████████▐██▌
██▄███████████▌█▌
███████▀██████▐▌█
██████████████▌▌▐
████████▄███████▐▐
█████████████████
███████████████▄██▄
██████████████▀▀▀
█████▀███▀▀▀

▄▄▄██████▄▄▄███████▄▄▄
███████████████████████████
███▌█████▀███▌█████▀▀███████████▄▄▄▄▄▄▄▄
███▌█████▄███▌█████▄███▐███████████████████▄
▐████████████▀███████▄██████████▀▀▀▀▀▀▀▀████▀
▐████████████▄██▄███████████▌█████████▄████▀
▐█████████▀█████████▌█████████████▄▄████▀
██████████▄███████████▐███▌██▄██████▀
██████████████▀███▐███▌██████████████████████
████▀██████▀▀█████████▌███▀▀▀▀███▀▀▀▀▀▀▀████▌
 
      P R E M I E R   B I T C O I N   C A S I N O   &   S P O R T S B O O K      

█▀▀









▀▀▀

▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

  98%  
RTP

 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

▀▀█









▀▀▀

█▀▀









▀▀▀

▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

 HIGH 
ODDS

 
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

▀▀█









▀▀▀
 
..PLAY NOW..
uvindele
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
August 09, 2025, 03:58:56 PM
 #11427

Can anyone share any key to 1PWo3JeB9jr.... Thanks.

7F92587DD9BD019205
Tony8989
Newbie
*
Offline Offline

Activity: 37
Merit: 0


View Profile
August 09, 2025, 09:38:00 PM
 #11428

Mara is a tool designed to quickly replace or front-run unconfirmed transactions by broadcasting competing ones. For the attacker, it’s effective and “safe” to use. For the victim, it means a real risk of losing funds if their transaction gets replaced before confirmation

basically Mara is one of several tools designed to do the same thing: quickly replace or front-run unconfirmed Bitcoin transactions by broadcasting competing transactions with higher fees.

What makes Mara notable is it’s often optimized for speed and automation, especially in the context of puzzle key cracking and mempool monitoring.

But fundamentally, it uses Bitcoin’s standard Replace-By-Fee (RBF) or mempool replacement rules—just like any other mempool?HuhHuh? Huh Huh Huh
BlackAKAAngel
Newbie
*
Offline Offline

Activity: 21
Merit: 0


View Profile
August 09, 2025, 09:45:06 PM
 #11429

my  BOT  its foolauto   Grin Grin Grin Grin


Monitor the address for new transactions. evry two secund refresh
 When a new transaction appears, it will get the txid and the amount
 it  will then extract the public key
 it will run RCKangaroo to find the private key
 As soon as the private key is found, it will
 Get the recommended transaction fee
 Create a new transaction to send the funds to your destination address, including the calculated fee.
 Sign the transaction
 Print the raw transaction hex to the console
 
and i testet work well
Jorge54PT
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
August 09, 2025, 10:12:30 PM
Last edit: August 10, 2025, 05:36:10 AM by Jorge54PT
 #11430

Mara is a tool designed to quickly replace or front-run unconfirmed transactions by broadcasting competing ones. For the attacker, it’s effective and “safe” to use. For the victim, it means a real risk of losing funds if their transaction gets replaced before confirmation

basically Mara is one of several tools designed to do the same thing: quickly replace or front-run unconfirmed Bitcoin transactions by broadcasting competing transactions with higher fees.

What makes Mara notable is it’s often optimized for speed and automation, especially in the context of puzzle key cracking and mempool monitoring.

But fundamentally, it uses Bitcoin’s standard Replace-By-Fee (RBF) or mempool replacement rules—just like any other mempool?HuhHuh? Huh Huh Huh
Mara doesn't publish the public key. Without it, no bot will notice any ID txid , public key, or anything else. When the origin address is 0, the all balance it's already in my new wallet Smiley then in the mempool my transaction appears saying: Public key not available or not published  Smiley something like that.
in short: bots are useless with Mara Smiley

https://www.binance.com/en/square/post/22423542983737
SimonNeedsBitcoin
Newbie
*
Offline Offline

Activity: 16
Merit: 0


View Profile
August 10, 2025, 08:46:56 AM
 #11431

my  BOT  its foolauto   Grin Grin Grin Grin


Monitor the address for new transactions. evry two secund refresh
 When a new transaction appears, it will get the txid and the amount
 it  will then extract the public key
 it will run RCKangaroo to find the private key
 As soon as the private key is found, it will
 Get the recommended transaction fee
 Create a new transaction to send the funds to your destination address, including the calculated fee.
 Sign the transaction
 Print the raw transaction hex to the console
 
and i testet work well

Does anyone else here have objections of designing such a robot? Is this unethical behavior commonplace?
Cricktor
Legendary
*
Offline Offline

Activity: 1358
Merit: 3403



View Profile
August 10, 2025, 09:22:08 AM
Merited by vjudeu (1)
 #11432

My viewpoint is that bots are part of the game and challenge. Bots use publicly available data to compete and I don't really see anything unethical with that.

When there are developed public tools which can find a private key much faster once the public key is publicly exposed, then anyone who participates in finding puzzle solutions has to cope with that.

You may perceive it as unfair because it's hard and costly to find the solution for #71or any remaining below 100ish as long as the public key is yet unknown. The puzzle creator gave his coins to be redeemed by anyone who can find a private key. Week entropy private keys are what they are: no safe protection for coins they control once the public key is exposed (and the weak entropy is known). If exposure of the public key makes the coins very vulnerable, then this is it exactly. Deal with it!

I may have referred in the past of such bots as stealer bots. After some thinking about it and my viewpoint presented above, I wouldn't declare it that way anymore. It's in my opinion no stealing.

YMMV, I'm genuinely interested how others see it. Please, try to explain if your opinion differs. I might be wrong with my own opinion and if so, I'd like to learn why!

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
Tony8989
Newbie
*
Offline Offline

Activity: 37
Merit: 0


View Profile
August 10, 2025, 09:58:52 AM
 #11433

ok so what is the solution i mean now the hard part is to get the bitcoin safe to your wallet, puzzle 71 is hard but not hard but the hard part is to send the found to your wallet
 lots of guys talk about mara but feel like mara is bots himself, and what about puzzle 67,66,65 ect found where safe send it to the wallet with not problem
benjaniah
Jr. Member
*
Offline Offline

Activity: 52
Merit: 3


View Profile
August 10, 2025, 10:55:27 AM
 #11434

ok so what is the solution i mean now the hard part is to get the bitcoin safe to your wallet, puzzle 71 is hard but not hard but the hard part is to send the found to your wallet
 lots of guys talk about mara but feel like mara is bots himself, and what about puzzle 67,66,65 ect found where safe send it to the wallet with not problem

You got it backwards, bro.
The hard part is finding the private key to the puzzle wallet address.
The easy part is creating the transaction that spends the puzzle UTXO's to your own wallet, and submitting the tx to Mara Slipstream.




Tony8989
Newbie
*
Offline Offline

Activity: 37
Merit: 0


View Profile
August 10, 2025, 11:04:45 AM
 #11435

Let’s get you verified
Select your residency and follow the steps
Residence
United Kingdom
Our service is not available at this time
Binance is currently reorganising its activities in the UK. Our services will be available soon. Stay tuned!
Cricktor
Legendary
*
Offline Offline

Activity: 1358
Merit: 3403



View Profile
August 10, 2025, 11:46:26 AM
 #11436

I wonder if other mining pools will implement something similar and public like https://slipstream.mara.com? Because regarding average block fees over time, Mara does have a significant edge compared to other mining pools, while only having around 5% of total network hash power.

See e.g. for past 1y https://mempool.space/graphs/mining/pools#1y where Mara blocks generate them on average a bit more than +6% additional transaction fees while all other mining pools have lower (below par, negative percentage) than naive mempool content transactions fees (the baseline of mempool.space is likely what their mempool sees as fees in all transactions they are aware of).

I'm pretty sure the better fee performance of Mara is attributed mostly to their public and easy accessible Slipstream service. It's at least double more expensive by default and offers also opportunities to get non-standard transactions confirmed, too. And of course the hidden non-public mempool of Slipstream is mandatory to (so far) safely redeem low entropy puzzles by not exposing a public key to the public while the transactions waits to be confirmed in a block.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
ExernalVN
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
August 10, 2025, 12:59:52 PM
 #11437


 but once you have the public key you can get the private key in seconds.




Tell me please what algorithm should be used if the range for the private key is known and the public key is known?
sxiclub
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
August 10, 2025, 01:53:52 PM
 #11438

my  BOT  its foolauto   Grin Grin Grin Grin


Monitor the address for new transactions. evry two secund refresh
 When a new transaction appears, it will get the txid and the amount
 it  will then extract the public key
 it will run RCKangaroo to find the private key
 As soon as the private key is found, it will
 Get the recommended transaction fee
 Create a new transaction to send the funds to your destination address, including the calculated fee.
 Sign the transaction
 Print the raw transaction hex to the console
 
and i testet work well

Does anyone else here have objections of designing such a robot? Is this unethical behavior commonplace?
It's unethical and very common. To me, it's the same as a thief waiting at a bank door for someone who's gone to make a cash withdrawal, only without the violence involved. Perhaps we should accept what another user said; it's part of the game in this virtual, anonymous world.
kTimesG
Full Member
***
Offline Offline

Activity: 700
Merit: 221


View Profile
August 10, 2025, 02:45:51 PM
 #11439

It's unethical and very common. To me, it's the same as a thief waiting at a bank door for someone who's gone to make a cash withdrawal, only without the violence involved. Perhaps we should accept what another user said; it's part of the game in this virtual, anonymous world.

Except that the someone making a cash withdrawal did it with a mask over their head and an AK47, if you know what I mean. There's absolutely nothing that entitled them to get the funds in the first place. If spending vast amounts of effort and money just to recover back a third of it (because IQ was too low before even attempting) is some sort of justification of cashing in some reward which was never under your name to begin with, let me bring you back to the real world: nobody will give a shit about personal dramas caused by stupidity.

Off the grid, training pigeons to broadcast signed messages.
Kelvin555
Jr. Member
*
Offline Offline

Activity: 63
Merit: 1


View Profile
August 10, 2025, 02:46:28 PM
 #11440


It's unethical and very common.

It's ethical.... whatever those bots are doing to low entropy puzzles is what RC is doing to puzzles over 115 bits with his RCKangaroo.

From outgoing transaction -> extract public key -> from public key find private key -> create and sign another transaction with the private key.

It does not matter who created the first outgoing transaction in the first place.
Pages: « 1 ... 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 [572] 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 ... 624 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!