Transaction 05c42b16d2b384cf602fae2d97d2e557f442252fb2f4f695eb81991a13443777

Block #67435

2010-07-14 22:28:41 +0000 UTC (~14 years, 2 months ago)

BTC Burned: 🔥1.2 BTC🔥


Inputs
1HRCRTBjdGPmbUVqQhhthBVyeAsGGFqXVJ
1.21 BTC
now $67,494.40
1.21 BTC
OP_DUP OP_HASH160 b41587a5efaf215e5859183fe38c93b4dcb9d47f OP_EQUALVERIFY OP_CHECKSIG pubkeyhash
Outputs
16DsRFSCbv8aPMmDcbP4wYsS4FV9hf6rt2
1.2 BTC
now $66,936.60
🔥1.2 BTC🔥
OP_DUP OP_HASH160 3947b5155f8641756a90c935fbf61814a65ec4a2 OP_EQUALVERIFY OP_CHECKSIG pubkeyhash
15VjRaDX9zpbA8LVnbrCAFzrVzN7ixHNsC
0.01 BTC
now $557.81
0.01 BTC
OP_DUP OP_HASH160 314f9045678d32fd426aa0332bc1869d459a8673 OP_EQUALVERIFY OP_CHECKSIG pubkeyhash

How did this transaction burn BTC?

ksd5’s Lost Key

On July 14th, bitcointalk user ksd5 created a thread1 trying to trace BTC sent to a change address.

It emerged that while trying to test double spend protection, the user inadvertently overwrote the wallet.dat file containing the private key to a change address which held their 1.2 BTC balance.

While the address is not explicitly stated in the post, enough information is provided to enable us to trace the transaction and address involved2.

View revision history

Lost Keys

The majority of Bitcoin is secured through the use of private keys. Wallet applications generate public and private keypairs, which are used to generate an address.

Modern wallets use deterministic systems such as BIP391 to generate a root key which is used to derive every subsequent key. Thus, ensuring you have a reliable, safe backup of the root key, typically a 12 or 24 word mnemonic phrase, is sufficient to recover access to your funds.

Before such systems were developed, most wallets stored each keypair individually. This resulted in a number of additional ways to lose access to your coins - old backups wouldn’t be able to recover any keys for addresses generated after the backup was taken, for instance.

Over the years, wallet applications have also had a number of bugs, leading to unstable key production, bad encryption, and other cases which inadvertently resulted in funds being directed to addresses without known keys.

Even if the wallets work perfectly, users do still lose access to their keys by neglecting to make backups or other mistakes. burned.money’s lost_keys group tracks cases for which there is a reasonable degree of confidence that the keys are genuinely and truly lost.

View revision history
Raw Transaction
{
  "txid": "05c42b16d2b384cf602fae2d97d2e557f442252fb2f4f695eb81991a13443777",
  "hash": "05c42b16d2b384cf602fae2d97d2e557f442252fb2f4f695eb81991a13443777",
  "version": 1,
  "size": 258,
  "vsize": 258,
  "weight": 1032,
  "locktime": 0,
  "vin": [
    {
      "txid": "f6ae9dd35703a46c1f6fa9482c44f47b57b7a9a92d2ee89a9257b68895e04028",
      "vout": 0,
      "scriptSig": {
        "asm": "30450220724fbc0bd08a2fdfb367f414bd5a724d403516f80f72f57b365d2f280429707a022100fda7bcaf446a7ba1aae1786b9ef809167d657e6a1e308c57d013593e5b245c82[ALL] 04c41d309e8e39fe0f437c819aea201d09a9a0dc5710a26300a94ace8795997502a5fc440d14cf3e98a7d949053b81fa05462a42a2badd7712f426bf17e27b4ad5",
        "hex": "4830450220724fbc0bd08a2fdfb367f414bd5a724d403516f80f72f57b365d2f280429707a022100fda7bcaf446a7ba1aae1786b9ef809167d657e6a1e308c57d013593e5b245c82014104c41d309e8e39fe0f437c819aea201d09a9a0dc5710a26300a94ace8795997502a5fc440d14cf3e98a7d949053b81fa05462a42a2badd7712f426bf17e27b4ad5"
      },
      "prevout": {
        "generated": false,
        "height": 67434,
        "value": "1.21000000",
        "scriptPubKey": {
          "asm": "OP_DUP OP_HASH160 b41587a5efaf215e5859183fe38c93b4dcb9d47f OP_EQUALVERIFY OP_CHECKSIG",
          "desc": "addr(1HRCRTBjdGPmbUVqQhhthBVyeAsGGFqXVJ)#lvqqryz2",
          "hex": "76a914b41587a5efaf215e5859183fe38c93b4dcb9d47f88ac",
          "address": "1HRCRTBjdGPmbUVqQhhthBVyeAsGGFqXVJ",
          "type": "pubkeyhash"
        }
      },
      "sequence": 4294967295
    }
  ],
  "vout": [
    {
      "value": "1.20000000",
      "n": 0,
      "scriptPubKey": {
        "asm": "OP_DUP OP_HASH160 3947b5155f8641756a90c935fbf61814a65ec4a2 OP_EQUALVERIFY OP_CHECKSIG",
        "desc": "addr(16DsRFSCbv8aPMmDcbP4wYsS4FV9hf6rt2)#uw9lnlkn",
        "hex": "76a9143947b5155f8641756a90c935fbf61814a65ec4a288ac",
        "address": "16DsRFSCbv8aPMmDcbP4wYsS4FV9hf6rt2",
        "type": "pubkeyhash"
      }
    },
    {
      "value": "0.01000000",
      "n": 1,
      "scriptPubKey": {
        "asm": "OP_DUP OP_HASH160 314f9045678d32fd426aa0332bc1869d459a8673 OP_EQUALVERIFY OP_CHECKSIG",
        "desc": "addr(15VjRaDX9zpbA8LVnbrCAFzrVzN7ixHNsC)#q0mzm33d",
        "hex": "76a914314f9045678d32fd426aa0332bc1869d459a867388ac",
        "address": "15VjRaDX9zpbA8LVnbrCAFzrVzN7ixHNsC",
        "type": "pubkeyhash"
      }
    }
  ],
  "fee": "0.00000000",
  "hex": "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",
  "blockhash": "0000000001b823276195b53843d767c2ed1af5db50cf3aaafa10ee4878b9adab",
  "time": 1279146521,
  "blocktime": 1279146521
}