Transaction 5096ddaed01a677996aa934af6ca15bece9c211a2bfa22710db9a490c6798b79

Block #294741

2014-04-08 04:25:23 +0000 UTC (~10 years, 4 months ago)

BTC Burned: 🔥0.0001 BTC🔥


Inputs
18rw5z8uRcd3megT2nu9ZafGmkhDDm7a7c
0.00057905 BTC
now $32.24
0.00057905 BTC
OP_DUP OP_HASH160 563a694a6868818b5012c164331253c5c7fdd80d OP_EQUALVERIFY OP_CHECKSIG pubkeyhash
Outputs
1LCq6ARR3V2Znq6HHWKssWQQxyc8YncmSi
0.00037905 BTC
now $21.11
0.00037905 BTC
OP_DUP OP_HASH160 d2a71bafeed91062de27762bbeffed481aa3966a OP_EQUALVERIFY OP_CHECKSIG pubkeyhash
1AdHAc4kYrMzwijP75b4qp4xqP3ZRuFqL1
0.0001 BTC
now $5.57
🔥0.0001 BTC🔥
OP_DUP OP_HASH160 699599dda59d7f4b73ffa23da578e96da9baff85 OP_EQUALVERIFY OP_CHECKSIG pubkeyhash

How did this transaction burn BTC?

Multibit’s Corrupted Blockchain.info import

In 2014, a user imported a Blockchain.info wallet into MultiBit. At the time, HD wallets were in their infancy, so each wallet was essentially a bundle of private keys.

After making a transaction, the user realized that the change output was sent to an address listed in the Multibit wallet, but the wallet did not appear to contain a private key for it1.

After some investigation by Mike Hearn, an early Bitcoin developer, it was discovered that during the import process, one of the keys was corrupted2. It remains unknown if this was caused by a bad blockchain.info export or a bug in Multibit.

View revision history

Lost Keys

The majority of Bitcoin is secured through the use of private keys. Wallet applications generate public and private keypairs, which are used to generate an address.

Modern wallets use deterministic systems such as BIP391 to generate a root key which is used to derive every subsequent key. Thus, ensuring you have a reliable, safe backup of the root key, typically a 12 or 24 word mnemonic phrase, is sufficient to recover access to your funds.

Before such systems were developed, most wallets stored each keypair individually. This resulted in a number of additional ways to lose access to your coins - old backups wouldn’t be able to recover any keys for addresses generated after the backup was taken, for instance.

Over the years, wallet applications have also had a number of bugs, leading to unstable key production, bad encryption, and other cases which inadvertently resulted in funds being directed to addresses without known keys.

Even if the wallets work perfectly, users do still lose access to their keys by neglecting to make backups or other mistakes. burned.money’s lost_keys group tracks cases for which there is a reasonable degree of confidence that the keys are genuinely and truly lost.

View revision history
Raw Transaction
{
  "txid": "5096ddaed01a677996aa934af6ca15bece9c211a2bfa22710db9a490c6798b79",
  "hash": "5096ddaed01a677996aa934af6ca15bece9c211a2bfa22710db9a490c6798b79",
  "version": 1,
  "size": 225,
  "vsize": 225,
  "weight": 900,
  "locktime": 0,
  "vin": [
    {
      "txid": "4efd7db5fffeb00135d24eebab1be8db28adcd545614d8da48b5b8a8af7f4fa1",
      "vout": 0,
      "scriptSig": {
        "asm": "304402203083f423dc06121b2192c0f99879bdf04465b0c643e8f03dc69a1c00234dd095022030dc36661ed90ddced036c12db510e4526a2346dc56557c0b07d2d812b194f60[ALL] 02a73d2a52d44b6247b785f96e3ed83f54b9769f50b532772c294d3c63742234c7",
        "hex": "47304402203083f423dc06121b2192c0f99879bdf04465b0c643e8f03dc69a1c00234dd095022030dc36661ed90ddced036c12db510e4526a2346dc56557c0b07d2d812b194f60012102a73d2a52d44b6247b785f96e3ed83f54b9769f50b532772c294d3c63742234c7"
      },
      "prevout": {
        "generated": false,
        "height": 294741,
        "value": "0.00057905",
        "scriptPubKey": {
          "asm": "OP_DUP OP_HASH160 563a694a6868818b5012c164331253c5c7fdd80d OP_EQUALVERIFY OP_CHECKSIG",
          "desc": "addr(18rw5z8uRcd3megT2nu9ZafGmkhDDm7a7c)#mvexazq0",
          "hex": "76a914563a694a6868818b5012c164331253c5c7fdd80d88ac",
          "address": "18rw5z8uRcd3megT2nu9ZafGmkhDDm7a7c",
          "type": "pubkeyhash"
        }
      },
      "sequence": 4294967295
    }
  ],
  "vout": [
    {
      "value": "0.00037905",
      "n": 0,
      "scriptPubKey": {
        "asm": "OP_DUP OP_HASH160 d2a71bafeed91062de27762bbeffed481aa3966a OP_EQUALVERIFY OP_CHECKSIG",
        "desc": "addr(1LCq6ARR3V2Znq6HHWKssWQQxyc8YncmSi)#kmkfnujn",
        "hex": "76a914d2a71bafeed91062de27762bbeffed481aa3966a88ac",
        "address": "1LCq6ARR3V2Znq6HHWKssWQQxyc8YncmSi",
        "type": "pubkeyhash"
      }
    },
    {
      "value": "0.00010000",
      "n": 1,
      "scriptPubKey": {
        "asm": "OP_DUP OP_HASH160 699599dda59d7f4b73ffa23da578e96da9baff85 OP_EQUALVERIFY OP_CHECKSIG",
        "desc": "addr(1AdHAc4kYrMzwijP75b4qp4xqP3ZRuFqL1)#kdcf9udw",
        "hex": "76a914699599dda59d7f4b73ffa23da578e96da9baff8588ac",
        "address": "1AdHAc4kYrMzwijP75b4qp4xqP3ZRuFqL1",
        "type": "pubkeyhash"
      }
    }
  ],
  "fee": "0.00010000",
  "hex": "0100000001a14f7fafa8b8b548dad8145654cdad28dbe81babeb4ed23501b0feffb57dfd4e000000006a47304402203083f423dc06121b2192c0f99879bdf04465b0c643e8f03dc69a1c00234dd095022030dc36661ed90ddced036c12db510e4526a2346dc56557c0b07d2d812b194f60012102a73d2a52d44b6247b785f96e3ed83f54b9769f50b532772c294d3c63742234c7ffffffff0211940000000000001976a914d2a71bafeed91062de27762bbeffed481aa3966a88ac10270000000000001976a914699599dda59d7f4b73ffa23da578e96da9baff8588ac00000000",
  "blockhash": "000000000000000075abf4bc51fb8b4e91668e0115e40336438f7837198e6200",
  "time": 1396931123,
  "blocktime": 1396931123
}