btcpuzzle logo

How to Safely Claim Your Bitcoin Puzzle Reward (Without Losing It to Bots)

09.04.2026 14:20:47 - 13 resposta(s)

Página1
Gravatar for 1lkerc27...w74a4eduRank
ilkerc (admin)1LKERC27...w74a4eDU
88784
09.04.2026 14:20:4718 dia

So you found a private key in Bitcoin Puzzle. What now?

Take a deep breath. Don't panic, don't get carried away with excitement. If you follow this guide carefully, step by step, you'll be able to claim your reward safely — without losing it to front-running bots.

We'll use a real private key and address throughout this guide to make things more concrete:

Private Key (Hex):
e7751904351bce5e4b99705d0f73f49ad46a0bfcfe6ad3329b2815cff5e51c65
Bitcoin Address:
1HFEcnxP2J1WMT8PF1LkSkcYs2LsKWMBCH

Step 1 — Store your private key somewhere safe

Write the hex key down on paper or store it in a secure, encrypted location. If it makes you feel safer, you can disconnect from the internet at this point.

Step 2 — Download Electrum 4.3.4

This is one of the last versions that allows you to disable RBF (Replace-By-Fee). Do not use a newer version.

https://download.electrum.org/4.3.4/

If the installer prompts you to update, decline and continue with the current version.

Step 3 — Convert your key to WIF format

Electrum requires the private key in WIF (Wallet Import Format). You have three options:

Option A: Use our tool offline: https://btcpuzzle.info/tools/hex-to-wif

Option B: Run the following Python script yourself:

import base58
import hashlib

def hex_to_wif(hex_private_key):
    extended_key = '80' + hex_private_key
    first_hash = hashlib.sha256(bytes.fromhex(extended_key)).digest()
    second_hash = hashlib.sha256(first_hash).digest()
    checksum = second_hash[:4]
    extended_key += checksum.hex()
    wif = base58.b58encode(bytes.fromhex(extended_key)).decode()
    return wif

wif = hex_to_wif("e7751904351bce5e4b99705d0f73f49ad46a0bfcfe6ad3329b2815cff5e51c65")
print("WIF:", wif)

Option C: You can use any other method you trust. We do not recommend any website for this purpose (including btcpuzzle.info). You can easily do this on your own computer with your own simple code.

Step 4 — Open Electrum and import your key

Click through the setup until you reach the wallet type screen. Select "Import Bitcoin addresses or private keys". Paste your WIF-formatted key into the field. You can skip setting a password if you prefer.

Step 5 — Disable RBF

Go to Tools → Preferences. Turn off "Use Replace-By-Fee". On the same screen, enable "Advanced Preview". This step is critical — if RBF is left on, bots can replace your transaction with a higher-fee one and steal your funds.

Step 6 — Set up the send screen

Go to the Send tab. Enter your own wallet address as the destination. Use the "Max" button to fill in the amount. Sending the full balance is essential — if any amount is left behind, bots can sweep it.

Step 7 — Set the fee rate

In the advanced preview window, confirm that RBF is shown as disabled in the top right. Then update the "Target fee" field at the bottom using the minimum fee rate listed on: https://slipstream.mara.com

You can go higher than the minimum if you want faster confirmation.

Step 8 — Finalize, but do NOT broadcast

Click "Finalize". Double-check the destination address and the amount. Do not click "Broadcast" — that would push the transaction directly to the mempool, where bots are watching.

Step 9 — Sign and export to file

Click "Sign". Then use "Export → Export to file" in the bottom left to save the signed transaction file. Close Electrum.

Step 10 — Submit via Slipstream

Open the exported file with a text editor. Copy the long hex string starting with 020... (it may start differently in some cases). Go to https://slipstream.mara.com, paste the value into the input field, and click "Activate Slipstream".

If you see "Transaction submitted" — you're done.

With this method, your transaction never enters the public mempool. It goes directly to MARA Pool miners and gets confirmed in the next block. All you have to do now is wait.

This is the most reliable way to protect yourself against front-running bots.

Gravatar for 1gdh1su8...fflvmrdtRank
btcseekeret 1GDH1sU8...fFLvMRDT
3206
09.04.2026 17:27:2118 dia

Good luck 🍀 to all

Gravatar for noneRank
bekirben bc1qunvz...ss30rhgr
110
11.04.2026 12:45:5816 dia

Thanks for the guide, I sincerely recommend this guide in case you are the winner

Gravatar for noneRank
anonymous456 bc1qr4w7...xqgzsym8
30
11.04.2026 18:41:0415 dia

i want to correct one thing that even if RBF is disabled still trasaction can be replaced by high fee check this replaced Tx of 66-bit puzzle that attacker replaced even though RBF was disabled

66-bit puzzle Replaced Tx Link:- https://www.blockchain.com/explorer/transactions/btc/8c8ec6b3511c62500ea9b3a1c30ca937e15d251b55d30290a2a6da2f1124f3fb

Gravatar for 1lkerc27...w74a4eduRank
ilkerc (admin)1LKERC27...w74a4eDU
88784
11.04.2026 19:11:4615 dia

Hello,

The main point here isn’t RBF itself—disabling RBF is just an extra precaution. The real focus is preventing the transaction from entering the mempool and protecting against bots. With this method, a pre-signed transaction is included in a block by Marapool. As far as I know, this is the first and only known method.

Yes, there are rumors that Puzzle 66 was taken by bots because it was executed as a standard transaction. That’s why it’s very important to include the transaction in a block without it ever entering the mempool.

Gravatar for noneRank
anonymous456 bc1qr4w7...xqgzsym8
30
12.04.2026 04:17:1815 dia

yeah but i am just saying that even if RBF is disabled still* tx can replaced by paying higher fee which very weird thing itself.

Gravatar for 1lkerc27...w74a4eduRank
ilkerc (admin)1LKERC27...w74a4eDU
88784
12.04.2026 15:19:2515 dia

Hello again,

Even without RBF enabled, you still have a few options to unstick a transaction:

1. CPFP (Child Pays for Parent) — best option

If you have a change output from the stuck transaction, create a new transaction spending that output with a very high fee. Miners see the combined fee of both transactions and are incentivized to confirm them together. This works whether you're the sender (change output) or the recipient (spending the received output).

2. Full-RBF (if your node supports it)

Since mid-2023, most Bitcoin Core nodes run Full-RBF by default, meaning even transactions that weren't flagged as replaceable can technically be replaced — as long as you hold the private keys. Support isn't universal but propagation is likely on modern nodes.

3. Mining pool accelerator

If you have no spendable output for CPFP and can't use RBF, paid accelerators from pools like ViaBTC or F2Pool are a last resort. They prioritize your transaction out-of-band.

4. Manual double-spend

Broadcast a new transaction using the same inputs with a higher fee. Bitcoin Core's abandontransaction RPC can help here. Note: propagation isn't guaranteed since nodes may see it as a double-spend attempt.

Even with RBF disabled, your transaction can still be replaced — because Full-RBF is now the default on most nodes. The RBF flag was never really a lock, just a signal.

Gravatar for noneRank
anonymous456 bc1qr4w7...xqgzsym8
30
13.04.2026 08:05:5814 dia

how RBF signaling differ from lock?

Gravatar for noneRank
bekirben bc1qunvz...ss30rhgr
110
13.04.2026 09:52:0814 dia

I would like to add an element for the key conversion, from private to WIF, you can also simply go to the site: " https://bitaddress.org " offline, enter the key in the appropriate box, so you will have everything: address, -u & -c, WIF is also the pubkey (offline)

Gravatar for 1lkerc27...w74a4eduRank
ilkerc (admin)1LKERC27...w74a4eDU
88784
13.04.2026 10:27:4814 dia

@anonymous456

how RBF signaling differ from lock?

The RBF flag was just a mempool policy. Nodes voluntarily chose not to relay replacements for non-RBF transactions. It was never a protocol-level rule. Full-RBF removed that courtesy, so now any unconfirmed tx can be replaced regardless of the flag. A true lock would be consensus-enforced, like a confirmed transaction.

Gravatar for noneRank
bekirben bc1qunvz...ss30rhgr
110
13.04.2026 22:11:2313 dia

I think that beyond the puzzles, there are people also interested in the so-called "sleeping wallet" from 2010 to 2020, in case these people find the private key, I recommend the same procedure recommended by our friend "ilkerc" as they too are exposed to bot attacks. Good luck to everyone.

Gravatar for noneRank
ozbtcoz bc1qj64t...yrzj9r82
70
14.04.2026 09:15:2113 dia

Hi Ilker,
Could you please pin this topic to top?
It includes valuable instructions and useful for rookies as me :)

Gravatar for noneRank
fawkiller bc1qfgew...zwhgsqv3
10
25.04.2026 10:34:372 dia

Hello,

Is it the same for puzzle 135 or not?

Brgds,

Página1