chrisnick19
Newbie
Offline
Activity: 22
Merit: 0
|
 |
September 16, 2025, 07:36:49 PM |
|
I do not know why i receive so many times 1PWo3JeBh...1PWo3JeBN....almost every time i start searching a range
|
|
|
|
|
fmg75
Newbie
Offline
Activity: 14
Merit: 0
|
 |
September 16, 2025, 07:39:44 PM |
|
Prefix or Suffix version with Stride..
1PWo3JeB95vecqb8fQ2tGzQ3T4fHxSmb1K 7xxxxx 1PWo3JeB9dobsiumbqYAJtkzQv8Lk71Md4 6xxxxx 1PWo3JeB9jA9uQUhPRNN91rR8kgqF3p1cQ 6xxxxx 1PWo3JeB9jpRt9dKR4PpzCAZYHWMm2rxf3 6xxxxx 1PWo3JeB9jKEPk1EQFVSdEhZamuij4msWV 6xxxxx 1PWo3JeB9jfwjqW7vCc9aNqnEbdPu9GUqS 5xxxxx 1PWo3JeB9jWQNfEGn2Ap9o5dHxnXfEbucf 6xxxxx 1PWo3JeB9jWG3HZmrcLtrFD5NhYd9UKYgD 6xxxxx 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU What do you mean by that? Share the last 4 bytes of your prefix address’s private key (PVK) and I’ll return every possible prefix within the 71-bit range in about 3 minutes on a single RTX 3060 Ti. (You can get similar results with BitCrack, but BitCrack only returns the PVK for the target address — it won’t list PVKs that belong to matching prefix addresses.) Example: Prefix Address: 1PWo3JeB9jRLz2NjTHsZ8uTBnqcjnu66Ak Last 4 bytes of PVK: B3E74856 Result:  1PWo3JggWE4Yn7ARaUBvYN6J1oPiKsThWJ 40133AD921B3E74856 1PWo3Jg6eJsDk9Hc47HR1wRGBgMtzp4ckV 4025698C3FB3E74856 1PWo3JeqdbckR9P66rSwNTumiNPRpKFexo 41549C313AB3E74856 1PWo3JfVxseXDayTF2qhurrX9DC2QKikqk 41FAE86E8BB3E74856 1PWo3JhAZwrk2oPDqK7QZWh5y7SGtMB5Je 42662C29A0B3E74856 1PWo3JePottCGRD6W3QckjoEkZ1SPrFAsj 4633808179B3E74856 1PWo3Jdhnapvx9D2BEQ3sviBEDGBCCR8TN 4690CADC94B3E74856 1PWo3JeVQrA2eqMowVPSQwDtgcVA1LBEvK 491EA84BE4B3E74856 1PWo3JfwZbHsqUa6f4CdwjWNWV3r3JJ5oh 49653FE0DEB3E74856 1PWo3Jeo36x59g447Z42mGp4PiNxfBoP27 49CAEB0C2FB3E74856 1PWo3JefLnj17Sh7jSywhKjCxRh1vkavbu 4A491A9A5FB3E74856 1PWo3JeNWrEr9JGPprZD32KJPmbnDJwN5q 4AEABEF18BB3E74856 1PWo3JeSdbTLtmSTLpBJef2tr87VwxSZhB 4B03EA12E1B3E74856 1PWo3JfjqnFeN4gevp5NagVTttqnC73tCd 4B49E10D30B3E74856 1PWo3Jf1UPqUW1vuDEytFh5VyJqz533t1U 4D71AAD224B3E74856 1PWo3JfHu89aF3N4LsKVmTptPuGW5v3pE1 4ED6AC14E5B3E74856 1PWo3Jefa3yQs8GCuRUxesGbB7Z8oTMYEv 5075542428B3E74856 1PWo3JfTiUM3T8srd3VvrA2ravGTh6jvpK 51CC19CE58B3E74856 1PWo3Jg3eRCkQ9ruh43AELgCjq5MGJQJc1 55F2D9179AB3E74856 1PWo3JfjZpsyAvVyfKnGDT7zyxqqiurRoa 56F933F253B3E74856 1PWo3JgznMcjLrWNzy4JZs4PzQgrzZF2GZ 57105FAF6DB3E74856 1PWo3JgfMKQS39M5i8gerqqBeJMxtXVv84 5941245810B3E74856 1PWo3JgLYrnfX4KSSMeTDhi8o5iREtrKiq 59FACE5476B3E74856 1PWo3Je9vrzA41Wwfj6MD63nYUNAoYpcyx 5AB983701BB3E74856 1PWo3JeD4B6tS3gX6NiXFoG18jaM1Bvdd8 5CF10D43A2B3E74856 1PWo3Jghp1UiGrXPKNZs4q8dfxJUttHSzu 5D59DAB815B3E74856 1PWo3JeeQ9ZdMe9WnQAT1FX7ikKwfRxWZe 5DEF2653CEB3E74856 1PWo3JfGeanixGULb67AarUhsmU16vtQNB 5F52890505B3E74856 1PWo3JgpoHpDPznsagYsw2ZrKbu7UvFxcG 6033874F4BB3E74856 1PWo3Jfpktjq9egzWjXHo7R4qRkG6G6Qb3 63DF9AD9D9B3E74856 1PWo3JeB9jRLz2NjTHsZ8uTBnqcjnu66Ak 649A103B78B3E74856 1PWo3JfPDscTNBbngkSz9JYFuMqGPtfkeM 64B28C5236B3E74856 1PWo3JeiWyLKNbpgnqdn3UX3W5qQr4exug 66295DB32DB3E74856 1PWo3JgP7WUyKS9PCntnbdaiH8CQpJadeC 6959ED2636B3E74856 1PWo3JfCSNh9fyTNtQjphApy2GGQ4itWH8 6995CCD229B3E74856 1PWo3Jem9E5o8cbwp1qWeEXSQdcPDFVSaE 6A98F49A87B3E74856 1PWo3Jh98ZotrYYvqFV9A9a8ke8rYJ8Sa8 6B46315E8BB3E74856 1PWo3JgC5DbJyVKj5cNieRjQQpTnsbm8S3 70609EEBA0B3E74856 1PWo3JdsAnDUbAmDD5KHkvBjteK7pTXNaM 7090418EE7B3E74856 1PWo3Jgo2mdCHkPRVVybhmbZE3NbGfk7ic 71BA578072B3E74856 1PWo3JdsKfUUpp7VCV8BPfFpZTNHCPcdvS 71CF8FAA53B3E74856 1PWo3Je2YFKbobawHVmCirWsexxPr6jr1i 71F2806D71B3E74856 1PWo3JeKtSEHvpj9EcLKSWKGQZavXrSLAA 7240EF5B90B3E74856 1PWo3JeJrtDLaSvekA3xQCAgeV7ZAbjVL9 729BBF9186B3E74856 1PWo3JdfNekTD4jZ5M1dXN2towV3W12TVq 74642E8DB8B3E74856 1PWo3JgKzLomY4UncwkqXCMC6GHyzBUMUK 7783F49749B3E74856 1PWo3JggbDLt4tgYKAdK1qyXQYy2eZeQTx 7A77F6E928B3E74856 1PWo3Jf9rxY3Tg8DaRCT58KwP8EJdTVpMs 7C022DA704B3E74856 1PWo3JfGMLXZgFkLH5FttazYndVuCbAcxC 7E5B3A895FB3E74856 1PWo3JgxtbKp8TF3kg6W2mbPnryXWweq5X 7E8C056295B3E74856 1PWo3JfyFVTTNE6dM4pHECVBcKkd7UzjP4 7FCC9D2EA5B3E74856 1PWo3JfqPMwrLmd969oN7oipCPshiCSZAH 7FF2A3D7C2B3E74856 What's the point of this search? There are no patterns in elliptic curve operations! If no pattern. Then why private key with same last 6 hex many match the front prefix like that zahid prefix jumper 😅. There might be pattern but complex pattern ✌️ I mean if you found 500-1000 prefix . It might give high chance using this jumper test that 500-1000 prefix that you found before to get the answer ....... What you believe (incorrectly): "Cryptographic operations preserve patterns!" "There's hidden mathematical structure in secp256k1!" "It's a fascinating cryptographic correlation!" What it REALLY is: Vanity mining with reduced search space Pure brute force in feasible range (2^71) Basic statistics: enough attempts → expected matches
|
|
|
|
|
willyzkibe
Newbie
Offline
Activity: 1
Merit: 0
|
 |
September 16, 2025, 08:28:58 PM |
|
If broadcasting a transaction from a solved Bitcoin puzzle gets hijacked instantly by bots, does that mean all transactions spending from solved puzzles were mined directly ? And if the publick keys to certain puzzle addresses are already exposed publicly, why haven’t the bots swept those funds yet, if they claim they can steal coins within seconds?
|
|
|
|
|
fmg75
Newbie
Offline
Activity: 14
Merit: 0
|
 |
September 16, 2025, 08:46:35 PM |
|
If broadcasting a transaction from a solved Bitcoin puzzle gets hijacked instantly by bots, does that mean all transactions spending from solved puzzles were mined directly ? And if the publick keys to certain puzzle addresses are already exposed publicly, why haven’t the bots swept those funds yet, if they claim they can steal coins within seconds?
You have some conceptual errors about the problem: With the public keys exposed, you can't move funds ---> You need to calculate the private key, currently puzzle 135 and multiples of 5 and up. ---> Use the polling kangaroo algorithm, etc. Bots can attack the PVKs of smaller puzzles, currently 71 and up, since it computationally leaves a window. In my humble opinion, small players currently have no chance. A large player who finds puzzle 71 will look for a very secure way to propagate, obviously avoiding the mempool.
|
|
|
|
|
chrisnick19
Newbie
Offline
Activity: 22
Merit: 0
|
 |
September 16, 2025, 08:57:31 PM |
|
You generally cannot directly broadcast a BTC transaction to miners without it entering the mempool, as the mempool is the standard, unavoidable gateway for transactions to be picked up and confirmed by the network. Bitcoin's design relies on the peer-to-peer network to relay transactions to nodes, which store them in their respective mempools before miners select them for inclusion in blocks. The only widely established method to bypass the mempool for most transactions is to use the Lightning Network, a second-layer protocol for fast, off-chain payments that only requires the main blockchain for opening and closing payment channels.
|
|
|
|
|
fmg75
Newbie
Offline
Activity: 14
Merit: 0
|
 |
September 16, 2025, 10:32:19 PM Last edit: September 17, 2025, 01:33:53 AM by fmg75 |
|
You generally cannot directly broadcast a BTC transaction to miners without it entering the mempool, as the mempool is the standard, unavoidable gateway for transactions to be picked up and confirmed by the network. Bitcoin's design relies on the peer-to-peer network to relay transactions to nodes, which store them in their respective mempools before miners select them for inclusion in blocks. The only widely established method to bypass the mempool for most transactions is to use the Lightning Network, a second-layer protocol for fast, off-chain payments that only requires the main blockchain for opening and closing payment channels.
You're wrong. This is exactly what anyone who finds a puzzle's private key should do. Avoid the public mempool and send the tx to a private node. Otherwise, they risk a front-running attack.
|
|
|
|
|
fecell
Jr. Member
Offline
Activity: 177
Merit: 2
|
 |
September 17, 2025, 02:27:42 AM |
|
That’s the true nature of brute force.  u'r right. kango, bsgs, lcg, and all other just a force of brute, but with different chance.
|
|
|
|
|
ffcd1144
Newbie
Offline
Activity: 2
Merit: 0
|
 |
September 18, 2025, 02:06:48 PM |
|
It seems that there are no longer many people paying attention to this thread.
|
|
|
|
|
brainless
Member

Offline
Activity: 462
Merit: 35
|
 |
September 18, 2025, 03:34:03 PM |
|
It seems that there are no longer many people paying attention to this thread.
Everyone waiting messages like congratulations to winner
|
13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
|
|
|
Kelvin555
Jr. Member
Offline
Activity: 63
Merit: 1
|
 |
September 18, 2025, 04:12:55 PM |
|
Now i am searching with 10 rigs and each of them with Total 109099.04 MK/s. So 10xTotal 109099.04 MK/s and i just started in this morning. I found a lot of keys with B9 and only one B9j. I hope soon to discover the key.
Do you own the 10 rigs or you rent them ?
|
|
|
|
|
|
|
chrisnick19
Newbie
Offline
Activity: 22
Merit: 0
|
 |
September 18, 2025, 04:27:13 PM |
|
This is a address with respect  1PWo3JeBossCxQ1GKaXYPLgTNVdUJkMvfw
|
|
|
|
|
fmg75
Newbie
Offline
Activity: 14
Merit: 0
|
 |
September 18, 2025, 08:39:47 PM |
|
An update to CUDACyclone that generates non-repeating, persistent random subranges. Ideal for collaborative search.
./CUDACyclone \ --range 400000000000000000:7fffffffffffffffff \ --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \ --random-subranges --num-subranges 10000000 --grid 256,8
|
|
|
|
|
TheMissingNTLDR
Newbie
Offline
Activity: 11
Merit: 0
|
 |
September 19, 2025, 02:27:26 PM |
|
An update to CUDACyclone that generates non-repeating, persistent random subranges. Ideal for collaborative search.
./CUDACyclone \ --range 400000000000000000:7fffffffffffffffff \ --address 1PWo3JeB9jrGwfHDNpdGK54CRas7fsVzXU \ --random-subranges --num-subranges 10000000 --grid 256,8
Would it not be faster if you target Hash 160 of the Address instead of the BTC Address. i.e. cut down on calculating Address from PK which is not needed.
|
|
|
|
|
TNavarro007
Newbie
Offline
Activity: 6
Merit: 0
|
 |
September 19, 2025, 04:05:44 PM |
|
Very interesting indeed. I wonder whether Garcia’s algorithm can quickly uncover it. The paper describes its application to Satoshi’s Block 170. Go to Substack → Posts and search for “CBGarcia.”
|
|
|
|
|
|
kTimesG
|
 |
September 19, 2025, 05:16:30 PM |
|
Very interesting indeed. I wonder whether Garcia’s algorithm can quickly uncover it. The paper describes its application to Satoshi’s Block 170. Go to Substack → Posts and search for “CBGarcia.”
I'm sorry but the author of that "paper" must have been on crack. My IQ dropped to -170 after reading through all of that BS. He should maybe stick to management science instead of trying to break crypto.
|
Off the grid, training pigeons to broadcast signed messages.
|
|
|
SilentSyntax
Newbie
Offline
Activity: 2
Merit: 0
|
 |
September 19, 2025, 06:21:50 PM |
|
I want to clear up something important for everyone in this Puzzle journey. The truth is: prefixes (whether in Base58 addresses or HASH160) have no relation to the actual private key. Through many experiments step by step till now, I can confirm that once we pass through the irreversible transformation of elliptic curve multiplication, any hope of tracing back from a prefix to the real private key is gone.  Thinking that a certain prefix gives us a “hint” about the actual key is just wishful thinking. The only practical use of prefixes is to measure and track our scanning progress. For example: Base58 (addresses):Each character = 1 in 58 chance. Probability of matching n chars = 1 / 58ⁿ. In 2³² ≈ 4.29B scans you expect: 1 char ≈ 74M matches 2 chars ≈ 1M matches 3 chars ≈ 22K matches 4 chars ≈ 376 matches 5 chars ≈ 7 matches 6 chars ≈ 1 matches HASH160 (hex):Each hex digit = 1 in 16 chance. Probability of matching n digits = 1 / 16ⁿ. In 2³² ≈ 4.29B scans you expect: 1 char ≈ 268M matches 2 chars ≈ 17M matches 3 chars ≈ 1M matches 4 chars ≈ 67k matches 5 chars ≈ 4k matches 6 chars ≈ 268 matches 7 chars ≈ 16 matches 8 chars ≈ 1 matches (On my one RTX 3060 Ti, this 2³² scan finishes in ~2 seconds, and I typically get 1 or 2 addresses with an 8-chars initial HASH160 hex match - sometimes none at all.) This shows clearly: prefix matching is only a statistical milestone, or a POW, not a clue toward the target private key. Regarding fixed bits - my own “fixed bits” formula based on prefix matching is still random - it doesn’t inject any new logic or shortcut. So in the end, prefix-based searching is just for fun, to keep ourselves engaged while facing the massive challenge of scanning through a 2^71 keyspace. This puzzle is all about grinding through the natural variance of randomness until we get lucky. That’s the true nature of brute force.  Hey, could you please share your "prefix" app? Or any open source ones which as you said were better? I don't seem to find any.
|
|
|
|
|
chrisnick19
Newbie
Offline
Activity: 22
Merit: 0
|
 |
September 19, 2025, 07:10:08 PM |
|
Why everybody want everything for free? From what i see there are smart guys and beggers...If someone is giving a good ideea, internet and chatGPT can help you build that ideea. Everyone want to win with work from other people without doing anything...this is not ok...
|
|
|
|
|
|
dextronomous
|
 |
September 19, 2025, 11:45:40 PM |
|
i think no need for greed on you telling all wanted for free by a newb, i think we know the best free software shared enough times by many over here, @btct like nomachine and amongst others a lot of the guys/girls here,
really miss this man,
guess many asked none received their answer if you want to know, begging? only that he took out his git pages cause he not nomachine offcourse , asked for money if you needed to decrypt the private key wich you might get with his closed source software,
so guess the seller is known not to sell, but did before give away free software, so relax brother,
|
|
|
|
|
brainless
Member

Offline
Activity: 462
Merit: 35
|
 |
September 20, 2025, 07:57:02 AM |
|
Asking a updates, upgrade, app, scripts, open source, compiled ver, changes, feedback, testing, etc is this begging ?? Oh one line missing Who buy me a coffee Is this begging too 
|
13sXkWqtivcMtNGQpskD78iqsgVy9hcHLF
|
|
|
|