Transaction c3b3dead7d0b7b228c553361b5683e12d9a8dc44a67b63c3666732399818c634

Block #837410

2024-04-02 15:21:49 +0000 UTC (~3 months, 10 hours ago)

BTC Burned: 🔥0.0003 BTC🔥


Inputs
bc1qkmpaez7a3tzwnedqv5h7nwgxct4nhgrmg4axvl
0.00127916 BTC
now $80.37
0.00127916 BTC
0 b6c3dc8bdd8ac4e9e5a0652fe9b906c2eb3ba07b witness_v0_keyhash
Outputs
1HT7xU2Ngenf7D4yocz2SAcnNLW7rK8d4E
0.0003 BTC
now $18.85
🔥0.0003 BTC🔥
OP_DUP OP_HASH160 b472a266d0bd89c13706a4132ccfb16f7c3b9fcb OP_EQUALVERIFY OP_CHECKSIG pubkeyhash

How did this transaction burn BTC?

The Empty String Public Key

The address 1HT7xU2Ngenf7D4yocz2SAcnNLW7rK8d4E is a Bitcoin address derived from an empty "" string as its public key. Wallets with bugs, including Bitcoin Core1, have at times attempted to derive an address using ripemd160(sha256("")), which producees 1HT7xU2Ngenf7D4yocz2SAcnNLW7rK8d4E.

As it is impossible for any private key to result in an empty public key, this address is provably unspendable.

View revision history

ECDSA Incompatibility

The Bitcoin Protocol relies on the secp256k1 elliptic curve for its cryptographic operations. This curve belongs to the larger family of elliptic curves.

Bitcoin also employs a number of hashing operations such as SHA-256 and RIPEMD-160. These operations are used in various places across the protocol, including in the creation of addresses and their corresponding Bitcoin Scripts.

In some cases, it is possible to select values that are invalid for the secp256k1 curve as inputs to the hashing operations. This can lead to unexpected results, such as the creation of addresses that can be used to receive BTC, but are never able to spend it.

View revision history
Raw Transaction
{
  "txid": "c3b3dead7d0b7b228c553361b5683e12d9a8dc44a67b63c3666732399818c634",
  "hash": "11d38b6e927f7b0ae49848035104441defde468082cfc5bab840612e87c3bf37",
  "version": 2,
  "size": 194,
  "vsize": 113,
  "weight": 449,
  "locktime": 0,
  "vin": [
    {
      "txid": "f21afa682691c554e4c2853295095ea9e39912adb667154ef50c20ba29c88888",
      "vout": 0,
      "scriptSig": {
        "asm": "",
        "hex": ""
      },
      "txinwitness": [
        "3044022028ffe80fcc882033c02c6b0556ace6b89cf158b8567b6b4c4f8b7734278117080220743bb814d9ed06c8926d4b7cf1d8bf82c2c62aad0fad39d513b280956a951f3301",
        "02847caf5d3967dd16b1cdb1eda6ce58fe74c98367e3f0d19b07906b8a2f03bbf9"
      ],
      "prevout": {
        "generated": false,
        "height": 826189,
        "value": "0.00127916",
        "scriptPubKey": {
          "asm": "0 b6c3dc8bdd8ac4e9e5a0652fe9b906c2eb3ba07b",
          "desc": "addr(bc1qkmpaez7a3tzwnedqv5h7nwgxct4nhgrmg4axvl)#0qxv5r70",
          "hex": "0014b6c3dc8bdd8ac4e9e5a0652fe9b906c2eb3ba07b",
          "address": "bc1qkmpaez7a3tzwnedqv5h7nwgxct4nhgrmg4axvl",
          "type": "witness_v0_keyhash"
        }
      },
      "sequence": 4294967295
    }
  ],
  "vout": [
    {
      "value": "0.00030000",
      "n": 0,
      "scriptPubKey": {
        "asm": "OP_DUP OP_HASH160 b472a266d0bd89c13706a4132ccfb16f7c3b9fcb OP_EQUALVERIFY OP_CHECKSIG",
        "desc": "addr(1HT7xU2Ngenf7D4yocz2SAcnNLW7rK8d4E)#htsvnqcg",
        "hex": "76a914b472a266d0bd89c13706a4132ccfb16f7c3b9fcb88ac",
        "address": "1HT7xU2Ngenf7D4yocz2SAcnNLW7rK8d4E",
        "type": "pubkeyhash"
      }
    }
  ],
  "fee": "0.00097916",
  "hex": "020000000001018888c829ba200cf54e1567b6ad1299e3a95e09953285c2e454c5912668fa1af20000000000ffffffff0130750000000000001976a914b472a266d0bd89c13706a4132ccfb16f7c3b9fcb88ac02473044022028ffe80fcc882033c02c6b0556ace6b89cf158b8567b6b4c4f8b7734278117080220743bb814d9ed06c8926d4b7cf1d8bf82c2c62aad0fad39d513b280956a951f33012102847caf5d3967dd16b1cdb1eda6ce58fe74c98367e3f0d19b07906b8a2f03bbf900000000",
  "blockhash": "000000000000000000028c4586ae2c602495386486d085ce23fdfd57db4fceeb",
  "time": 1712071309,
  "blocktime": 1712071309
}