Transaction a26245890834c2d628dfb7555b9ce8019d2b008e0a1fd616fc411ba9b58adb91

Block #293425

2014-03-31 16:47:29 +0000 UTC (~10 years, 4 months ago)

BTC Burned: 🔥0.4985 BTC🔥


Inputs
18c7UU2WsZ1khfNWrgAnbsU7UxmH24J6Ej
0.5226 BTC
now $29,683.63
0.5226 BTC
OP_DUP OP_HASH160 536cd7ceae38919b39ad1b746b5b9c4c954c8eeb OP_EQUALVERIFY OP_CHECKSIG pubkeyhash
Outputs
1NXsTsFSAvitkaRUTe9kxkLNANBRryJQeQ
0.024 BTC
now $1,363.20
0.024 BTC
OP_DUP OP_HASH160 ec313eb094ee975e292199b1094a6b097a1e2bfc OP_EQUALVERIFY OP_CHECKSIG pubkeyhash
1AdHAc4kYrMzwijP75b4qp4xqP3ZRuFqL1
0.4985 BTC
now $28,314.75
🔥0.4985 BTC🔥
OP_DUP OP_HASH160 699599dda59d7f4b73ffa23da578e96da9baff85 OP_EQUALVERIFY OP_CHECKSIG pubkeyhash

How did this transaction burn BTC?

Multibit’s Corrupted Blockchain.info import

In 2014, a user imported a Blockchain.info wallet into MultiBit. At the time, HD wallets were in their infancy, so each wallet was essentially a bundle of private keys.

After making a transaction, the user realized that the change output was sent to an address listed in the Multibit wallet, but the wallet did not appear to contain a private key for it1.

After some investigation by Mike Hearn, an early Bitcoin developer, it was discovered that during the import process, one of the keys was corrupted2. It remains unknown if this was caused by a bad blockchain.info export or a bug in Multibit.

View revision history

Lost Keys

The majority of Bitcoin is secured through the use of private keys. Wallet applications generate public and private keypairs, which are used to generate an address.

Modern wallets use deterministic systems such as BIP391 to generate a root key which is used to derive every subsequent key. Thus, ensuring you have a reliable, safe backup of the root key, typically a 12 or 24 word mnemonic phrase, is sufficient to recover access to your funds.

Before such systems were developed, most wallets stored each keypair individually. This resulted in a number of additional ways to lose access to your coins - old backups wouldn’t be able to recover any keys for addresses generated after the backup was taken, for instance.

Over the years, wallet applications have also had a number of bugs, leading to unstable key production, bad encryption, and other cases which inadvertently resulted in funds being directed to addresses without known keys.

Even if the wallets work perfectly, users do still lose access to their keys by neglecting to make backups or other mistakes. burned.money’s lost_keys group tracks cases for which there is a reasonable degree of confidence that the keys are genuinely and truly lost.

View revision history
Raw Transaction
{
  "txid": "a26245890834c2d628dfb7555b9ce8019d2b008e0a1fd616fc411ba9b58adb91",
  "hash": "a26245890834c2d628dfb7555b9ce8019d2b008e0a1fd616fc411ba9b58adb91",
  "version": 1,
  "size": 226,
  "vsize": 226,
  "weight": 904,
  "locktime": 0,
  "vin": [
    {
      "txid": "e28ea1d4fd89fddf8500d73ebaf24aa0ed13ef42e188e2c263c0383cd9578c58",
      "vout": 0,
      "scriptSig": {
        "asm": "3045022100f9773552edb19716f2d1d90bd671dce505387e05fffb92a7d37c21a479a4ecfe022060d00950ae27e9eeac82bfa3ba279fabb4bf6042e50630d4450b79952119dff4[ALL] 03ceb8871644ab2dfb7b1fca82b0c81e7da16038e09bfc9729f7338e6c5836006c",
        "hex": "483045022100f9773552edb19716f2d1d90bd671dce505387e05fffb92a7d37c21a479a4ecfe022060d00950ae27e9eeac82bfa3ba279fabb4bf6042e50630d4450b79952119dff4012103ceb8871644ab2dfb7b1fca82b0c81e7da16038e09bfc9729f7338e6c5836006c"
      },
      "prevout": {
        "generated": false,
        "height": 293343,
        "value": "0.52260000",
        "scriptPubKey": {
          "asm": "OP_DUP OP_HASH160 536cd7ceae38919b39ad1b746b5b9c4c954c8eeb OP_EQUALVERIFY OP_CHECKSIG",
          "desc": "addr(18c7UU2WsZ1khfNWrgAnbsU7UxmH24J6Ej)#xf62re5f",
          "hex": "76a914536cd7ceae38919b39ad1b746b5b9c4c954c8eeb88ac",
          "address": "18c7UU2WsZ1khfNWrgAnbsU7UxmH24J6Ej",
          "type": "pubkeyhash"
        }
      },
      "sequence": 4294967295
    }
  ],
  "vout": [
    {
      "value": "0.02400000",
      "n": 0,
      "scriptPubKey": {
        "asm": "OP_DUP OP_HASH160 ec313eb094ee975e292199b1094a6b097a1e2bfc OP_EQUALVERIFY OP_CHECKSIG",
        "desc": "addr(1NXsTsFSAvitkaRUTe9kxkLNANBRryJQeQ)#u7cvmm7v",
        "hex": "76a914ec313eb094ee975e292199b1094a6b097a1e2bfc88ac",
        "address": "1NXsTsFSAvitkaRUTe9kxkLNANBRryJQeQ",
        "type": "pubkeyhash"
      }
    },
    {
      "value": "0.49850000",
      "n": 1,
      "scriptPubKey": {
        "asm": "OP_DUP OP_HASH160 699599dda59d7f4b73ffa23da578e96da9baff85 OP_EQUALVERIFY OP_CHECKSIG",
        "desc": "addr(1AdHAc4kYrMzwijP75b4qp4xqP3ZRuFqL1)#kdcf9udw",
        "hex": "76a914699599dda59d7f4b73ffa23da578e96da9baff8588ac",
        "address": "1AdHAc4kYrMzwijP75b4qp4xqP3ZRuFqL1",
        "type": "pubkeyhash"
      }
    }
  ],
  "fee": "0.00010000",
  "hex": "0100000001588c57d93c38c063c2e288e142ef13eda04af2ba3ed70085dffd89fdd4a18ee2000000006b483045022100f9773552edb19716f2d1d90bd671dce505387e05fffb92a7d37c21a479a4ecfe022060d00950ae27e9eeac82bfa3ba279fabb4bf6042e50630d4450b79952119dff4012103ceb8871644ab2dfb7b1fca82b0c81e7da16038e09bfc9729f7338e6c5836006cffffffff02009f2400000000001976a914ec313eb094ee975e292199b1094a6b097a1e2bfc88ac90a6f802000000001976a914699599dda59d7f4b73ffa23da578e96da9baff8588ac00000000",
  "blockhash": "0000000000000000d688a82394c2cbc01f3a7a45497686bbe5463ca837c623ac",
  "time": 1396284449,
  "blocktime": 1396284449
}