Transaction 5e86fc762b000741317c59e405d13d4c33ee28a2489e0fb92bd1fa37e4b1ef3b
Block #786995
2023-04-25 21:17:54 +0000 UTC (~1 year, 2 months ago)
BTC Burned: 🔥0.00006255 BTC🔥
How did this transaction burn BTC?
The 0x00 Public Key Address
The 1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh
address is a Pay-to-Public-Key-Hash (P2PKH) address that is derived from a public key that solely contains the byte 0x00
. This is the point at infinity on the secp256k1 elliptic curve, and is not a permitted public key1.
This results in any BTC sent to this address being irrevocably lost, as it is impossible to generate a signature that will validate against the 0x00
public key.
Over the years, a handful of bugs2 in wallet applications have resulted in users inadvertently sending BTC to this address.
ECDSA Incompatibility
The Bitcoin Protocol relies on the secp256k1 elliptic curve for its cryptographic operations. This curve belongs to the larger family of elliptic curves.
Bitcoin also employs a number of hashing operations such as SHA-256 and RIPEMD-160. These operations are used in various places across the protocol, including in the creation of addresses and their corresponding Bitcoin Scripts.
In some cases, it is possible to select values that are invalid for the secp256k1 curve as inputs to the hashing operations. This can lead to unexpected results, such as the creation of addresses that can be used to receive BTC, but are never able to spend it.
View revision historyRaw Transaction
{
"txid": "5e86fc762b000741317c59e405d13d4c33ee28a2489e0fb92bd1fa37e4b1ef3b",
"hash": "78926ecc189754fc1e6cecae36816c4ff5a9b2339033fadd7509510f5a119e58",
"version": 1,
"size": 197,
"vsize": 146,
"weight": 581,
"locktime": 0,
"vin": [
{
"txid": "ace7f0a8bb5c59e5b4b1761557e4370f9b580fe0f6dd99c5c96386db888f74c1",
"vout": 0,
"scriptSig": {
"asm": "",
"hex": ""
},
"txinwitness": [
"5f85ddce44ed45070437e0cc721ceda1c67b0b413444bfd13f01e24301e786868dc809d37e486e79ee9fc542d5c447ad67467661b822aa7c6065bd3add1f6e9201"
],
"prevout": {
"generated": false,
"height": 786995,
"value": "0.00010907",
"scriptPubKey": {
"asm": "1 ffb61377608ea85770682cbf289a05e0c37c85ccb6ba40848459f967abd2c3d0",
"desc": "rawtr(ffb61377608ea85770682cbf289a05e0c37c85ccb6ba40848459f967abd2c3d0)#mzzfxh5a",
"hex": "5120ffb61377608ea85770682cbf289a05e0c37c85ccb6ba40848459f967abd2c3d0",
"address": "bc1pl7mpxamq3659wurg9jlj3xs9urphepwvk6ayppyyt8uk027jc0gqlawyp4",
"type": "witness_v1_taproot"
}
},
"sequence": 4294967295
}
],
"vout": [
{
"value": "0.00001387",
"n": 0,
"scriptPubKey": {
"asm": "1 ab35fec4c4cfc273ede01a36ae68d1b35e3542b9a9ea7e45ae58da10fd448a52",
"desc": "rawtr(ab35fec4c4cfc273ede01a36ae68d1b35e3542b9a9ea7e45ae58da10fd448a52)#86l74gr5",
"hex": "5120ab35fec4c4cfc273ede01a36ae68d1b35e3542b9a9ea7e45ae58da10fd448a52",
"address": "bc1p4v6la3xyelp88m0qrgm2u6x3kd0r2s4e4848u3dwtrdppl2y3ffqzxy0ar",
"type": "witness_v1_taproot"
}
},
{
"value": "0.00006255",
"n": 1,
"scriptPubKey": {
"asm": "OP_DUP OP_HASH160 9f7fd096d37ed2c0e3f7f0cfc924beef4ffceb68 OP_EQUALVERIFY OP_CHECKSIG",
"desc": "addr(1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh)#gvyw8dzc",
"hex": "76a9149f7fd096d37ed2c0e3f7f0cfc924beef4ffceb6888ac",
"address": "1FYMZEHnszCHKTBdFZ2DLrUuk3dGwYKQxh",
"type": "pubkeyhash"
}
}
],
"fee": "0.00003265",
"hex": "01000000000101c1748f88db8663c9c599ddf6e00f589b0f37e4571576b1b4e5595cbba8f0e7ac0000000000ffffffff026b05000000000000225120ab35fec4c4cfc273ede01a36ae68d1b35e3542b9a9ea7e45ae58da10fd448a526f180000000000001976a9149f7fd096d37ed2c0e3f7f0cfc924beef4ffceb6888ac01415f85ddce44ed45070437e0cc721ceda1c67b0b413444bfd13f01e24301e786868dc809d37e486e79ee9fc542d5c447ad67467661b822aa7c6065bd3add1f6e920100000000",
"blockhash": "00000000000000000005116e0a09a00e0fa82577d60eea72c214c951643099c3",
"time": 1682457474,
"blocktime": 1682457474
}