Instructions: 1. Enter a TXID. 2. If two consecutive inputs share the same R-Value (R-reuse), the Private Key will be recovered. 3. Internet connection is required for API access.
Note: Public Key is only available for P2PKH addresses that have been spent from (API lookup required).
Instructions: Enter a WIF key where the missing characters are replaced by an asterisk (*). Example: 5J*d*2V
Instructions: Enter a P2PKH (1...) or P2SH (3...) address and the number of transactions to analyze. This tool checks for repeated ECDSA R-values (nonce reuse) in the latest transactions, which indicates a severe vulnerability.