Transaction 325f9df0c9cac98e30b02ce9e35d02eda8f15be9f89cb302454a2bb6c6bc9aeb
Block #339705
2015-01-19 23:33:16 +0000 UTC (~9 years, 7 months ago)
BTC Burned: 🔥0.02317475 BTC🔥
How did this transaction burn BTC?
The 0x00 Public Key Address
The 1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh
address is a Pay-to-Public-Key-Hash (P2PKH) address that is derived from a public key that solely contains the byte 0x00
. This is the point at infinity on the secp256k1 elliptic curve, and is not a permitted public key1.
This results in any BTC sent to this address being irrevocably lost, as it is impossible to generate a signature that will validate against the 0x00
public key.
Over the years, a handful of bugs2 in wallet applications have resulted in users inadvertently sending BTC to this address.
ECDSA Incompatibility
The Bitcoin Protocol relies on the secp256k1 elliptic curve for its cryptographic operations. This curve belongs to the larger family of elliptic curves.
Bitcoin also employs a number of hashing operations such as SHA-256 and RIPEMD-160. These operations are used in various places across the protocol, including in the creation of addresses and their corresponding Bitcoin Scripts.
In some cases, it is possible to select values that are invalid for the secp256k1 curve as inputs to the hashing operations. This can lead to unexpected results, such as the creation of addresses that can be used to receive BTC, but are never able to spend it.
View revision historyRaw Transaction
{
"txid": "325f9df0c9cac98e30b02ce9e35d02eda8f15be9f89cb302454a2bb6c6bc9aeb",
"hash": "325f9df0c9cac98e30b02ce9e35d02eda8f15be9f89cb302454a2bb6c6bc9aeb",
"version": 1,
"size": 225,
"vsize": 225,
"weight": 900,
"locktime": 0,
"vin": [
{
"txid": "d0cf81a7cc0e199d3a8b69e5ce113c76724b73a7757c181e66e7bcca977ed94f",
"vout": 1,
"scriptSig": {
"asm": "304402201523867139e3336d319b74d9bfaa5ffbee2900847233960e10ccf36f54cc39a702201d7a5c2d39dfa85ff330de72244a1a533c4ea0340af8714ac9f41d7d59b1454f[ALL] 037282a0bfc480189ee924ae8bf8926631277dfd1d732127eb33f59ad4df38260a",
"hex": "47304402201523867139e3336d319b74d9bfaa5ffbee2900847233960e10ccf36f54cc39a702201d7a5c2d39dfa85ff330de72244a1a533c4ea0340af8714ac9f41d7d59b1454f0121037282a0bfc480189ee924ae8bf8926631277dfd1d732127eb33f59ad4df38260a"
},
"prevout": {
"generated": false,
"height": 339477,
"value": "0.04163264",
"scriptPubKey": {
"asm": "OP_DUP OP_HASH160 09748bdcf6197263c5cb8522942823c482e9b2a3 OP_EQUALVERIFY OP_CHECKSIG",
"desc": "addr(1rzhWUU7LP9iyyeas4hT223kogqy6w67G)#w5z3wh3n",
"hex": "76a91409748bdcf6197263c5cb8522942823c482e9b2a388ac",
"address": "1rzhWUU7LP9iyyeas4hT223kogqy6w67G",
"type": "pubkeyhash"
}
},
"sequence": 4294967295
}
],
"vout": [
{
"value": "0.01835789",
"n": 0,
"scriptPubKey": {
"asm": "OP_DUP OP_HASH160 7296ef26a62b8e26d0f918d0e579ce0ace0c876b OP_EQUALVERIFY OP_CHECKSIG",
"desc": "addr(1BStqxf454fpg3n142UUNAejNZ8ww1E3nc)#v6tya3ag",
"hex": "76a9147296ef26a62b8e26d0f918d0e579ce0ace0c876b88ac",
"address": "1BStqxf454fpg3n142UUNAejNZ8ww1E3nc",
"type": "pubkeyhash"
}
},
{
"value": "0.02317475",
"n": 1,
"scriptPubKey": {
"asm": "OP_DUP OP_HASH160 9f7fd096d37ed2c0e3f7f0cfc924beef4ffceb68 OP_EQUALVERIFY OP_CHECKSIG",
"desc": "addr(1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh)#gvyw8dzc",
"hex": "76a9149f7fd096d37ed2c0e3f7f0cfc924beef4ffceb6888ac",
"address": "1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh",
"type": "pubkeyhash"
}
}
],
"fee": "0.00010000",
"hex": "01000000014fd97e97cabce7661e187c75a7734b72763c11cee5698b3a9d190ecca781cfd0010000006a47304402201523867139e3336d319b74d9bfaa5ffbee2900847233960e10ccf36f54cc39a702201d7a5c2d39dfa85ff330de72244a1a533c4ea0340af8714ac9f41d7d59b1454f0121037282a0bfc480189ee924ae8bf8926631277dfd1d732127eb33f59ad4df38260affffffff020d031c00000000001976a9147296ef26a62b8e26d0f918d0e579ce0ace0c876b88aca35c2300000000001976a9149f7fd096d37ed2c0e3f7f0cfc924beef4ffceb6888ac00000000",
"blockhash": "00000000000000001890266728d716888a76064a925e4cd1d73d94e93ec0070c",
"time": 1421710396,
"blocktime": 1421710396
}