You can add a rotating proxies functionality so they don't filter out your requests from IP and just ignore them all, you could also probably put those words_array into a file and read the file instead of having it in your text editor like that or use an API or use webscraping.. whatever floats your boat.
@@kezif No they don't, look up free proxies or free socks4/5 proxies, free http proxies, free https proxies... there's forums that have like 5000+ proxies just freely available, just look around and you'll see 'em.
@@kezif The bandwidth is minimal with requests, if the scammer doesnt block free proxies. Just have a function call, to check if the proxies are working, add those that where working (within a given time,) to another list. Then iterate over said list.
And then they will write a quick script to throw away all the seed phrases that don't pass the checksum which 1 in 2048 won't. And with the remaining ones they will automatically scan for a balance and withdrawal any funds that have a balance. Anyone who knows what they are doing won't even save the seed to a database unless the seed generates an address that has funds on it. This is a decent denial of service as it's wasting their resources more than it's wasting your resources, but it's definitely not going to put a stop to them. If anything they w do a simple IP ban after getting more than 5 submissions from the same ip within a couple minutes which will completely negate this entire denial of service
However most scammers r just Indian/African script kiddies using public phishing code and making a website like this who dont have much technical knowledge to do allat, so it would slow them down
Nice video. Done the exact same concept but on scammers using fake shops and stealing debit/credit card info. made a similar script but randomly created 16 digits an checked if it was accepted by the Luhn algorithm. Sent hundreds of thousands until there website was rate limited and shutdown.
The website database probably stores the IP or user agent (python requests user agent) per request so they will just be able to drop all records that match an IP or the user agent for python requests. Nice idea though
@@YouLolNotLolYou The website owner could just audit the logs. All the proxy IPs that made more than one request in a certain period of time can just be removed
Anyone with a brain would automatically check for an address with balance whenever their server is hit with a seed, and then only make it notify them if balance is found, and they would also place a rate limit. Using proxies and separating the requests time would be wiser. But then again you're wasting money to do little to no damage to their operations.
You would have to wait many many many many many many many many many many many many many many many many many many many many many many many many many many many thousands of years
at least with firefox, a way easier and nicer approach would be just right-click in the network tab, and copy POST values, and using that, directly, in the script it seems to include a lot more than just the post data, which is useful, e.g. you would definitely want to fake a real browser user-agent, else it's TRIVIAL for them to just throw out every input submitted by a certain user-agent, but if you use your real user-agent, then they'd have to ban everyone with that browser, and if you upgrade browser, it'd change too tho downside, the format will change depending on the actual format, e.g. whether it's form-endoced, or json-encoded, but it'd still be easy enough, I think
When I tried to use it, it didn't work with IDLE, so I used it with VSC, where it then worked. If it doesn't work with IDLE, and you have requests installed, use VSC
I approximated that there are 1962 words, 109 columns with 18 in a row, with some simple math we can estimate that the chance is : 1 in 9.19×10⁷⁸. Even if he will send 1 trilion requests the probability, is similar to guessing a specific atom across the universe.
Hell yeah, pretty trash code innit 😎, but the point of the video was to make something that works, not something that the google coding team would approve of
This is pretty badly coded ngl and a simple ip block and algorithm check of the words will filter out 99% of the fakes. You could use a proxy for the ip blocking but the othwr problem still exists, also it (most likely) wont be them putting in the data manually it will be automated making it alot faster to sort through and find real ones. Also if you wanted it faster use threading
You can add a rotating proxies functionality so they don't filter out your requests from IP and just ignore them all, you could also probably put those words_array into a file and read the file instead of having it in your text editor like that or use an API or use webscraping.. whatever floats your boat.
rotating proxies cost money :(
You can get free proxy list lmfao @@kezif
@@kezif No they don't, look up free proxies or free socks4/5 proxies, free http proxies, free https proxies... there's forums that have like 5000+ proxies just freely available, just look around and you'll see 'em.
@@kezif
The bandwidth is minimal with requests,
if the scammer doesnt block free proxies. Just have a function call, to check if the proxies are working, add those that where working (within a given time,) to another list. Then iterate over said list.
@@kezif theres a lot of free proxies on the internet
And then they will write a quick script to throw away all the seed phrases that don't pass the checksum which 1 in 2048 won't. And with the remaining ones they will automatically scan for a balance and withdrawal any funds that have a balance. Anyone who knows what they are doing won't even save the seed to a database unless the seed generates an address that has funds on it. This is a decent denial of service as it's wasting their resources more than it's wasting your resources, but it's definitely not going to put a stop to them. If anything they w do a simple IP ban after getting more than 5 submissions from the same ip within a couple minutes which will completely negate this entire denial of service
remember, these guys are braindead and are only after money.
However most scammers r just Indian/African script kiddies using public phishing code and making a website like this who dont have much technical knowledge to do allat, so it would slow them down
@@ibrahimdevx ye
well what about using multi threading and using proxies?
This is true, do you have an alternative option to fucking with scammers? (also I heavily agree with @ibrahimdevx)
"Welcome to ScammerJam 2024. How many of 'em can YOU jam?" came to mind...
Nice video. Done the exact same concept but on scammers using fake shops and stealing debit/credit card info. made a similar script but randomly created 16 digits an checked if it was accepted by the Luhn algorithm. Sent hundreds of thousands until there website was rate limited and shutdown.
Don't forget to place input vars in same order. Scammers will be able to detect your requests
i love how you actually teach us python along the way! Much love g
Thank you virxs
@@the5dollarwrench no worries
in post_data, you could most likely optimise it with a cheeky for loop to make the code ever cleaner
The website database probably stores the IP or user agent (python requests user agent) per request so they will just be able to drop all records that match an IP or the user agent for python requests. Nice idea though
Yeah, you can edit the code and use proxy list and random user agent :) Eazy
@@YouLolNotLolYou The website owner could just audit the logs. All the proxy IPs that made more than one request in a certain period of time can just be removed
@@enderagent you can buy pool of 20k ips for few bucks :)
@@YouLolNotLolYou Which the person in the video did not do, so my original message stands
Yeah
That's genius!!!
After watching I created a similar program, but it generates credit cards (that pass the luhn check) and spams those.
Now imagine if your script randomly generated someone's actual seed phrase 😬
I wanted to do a similar thing with bank scams though i was worried the scammers would iust save the ip and remove all answers from the same ip
they do that
Bro ty for the idea and honestly im gonna do this.
I love this its ez concept :)
Thank you
but that might also generate a live wallet?
yea but the chance is likee winning a jackpot and thee scammers can generatee random walllets themselves
@@1slyzz1 oh ok
Anyone with a brain would automatically check for an address with balance whenever their server is hit with a seed, and then only make it notify them if balance is found, and they would also place a rate limit. Using proxies and separating the requests time would be wiser. But then again you're wasting money to do little to no damage to their operations.
This would imply seed phrase scammers have a brain
It's a really nice idea, though I'm not sure if they are just using the last wallet you sent... They might get only one
it prints out the wallet sent and its a new one each time
What if you left this running for long enough that it generated someones actual combination
You would have to wait many many many many many many many many many many many many many many many many many many many many many many many many many many many thousands of years
Scammer will filter out all your entries by IP when you send that many..
at least with firefox, a way easier and nicer approach would be just right-click in the network tab, and copy POST values, and using that, directly, in the script
it seems to include a lot more than just the post data, which is useful, e.g. you would definitely want to fake a real browser user-agent, else it's TRIVIAL for them to just throw out every input submitted by a certain user-agent, but if you use your real user-agent, then they'd have to ban everyone with that browser, and if you upgrade browser, it'd change too
tho downside, the format will change depending on the actual format, e.g. whether it's form-endoced, or json-encoded, but it'd still be easy enough, I think
When I tried to use it, it didn't work with IDLE, so I used it with VSC, where it then worked. If it doesn't work with IDLE, and you have requests installed, use VSC
Glad you found another solution!
Also subbed
How dont you get 429?
?
Scammer gets scammed
What are the odds of you accidentally guessing someone’s seed phrase
I approximated that there are 1962 words, 109 columns with 18 in a row, with some simple math we can estimate that the chance is : 1 in 9.19×10⁷⁸. Even if he will send 1 trilion requests the probability, is similar to guessing a specific atom across the universe.
You would have a better chance of winning the lottery 100 times in a row
@@the5dollarwrench damn that’s low
The poor granny who's address you guessed right :D
suboptimal development
🤓
let the guy cook
@@kezif ong ong
lol
this is why people need to stop using python, see that code at the beginning?
Yeah, it's HTML 😂
@@lxcyfxr5119 0:12 you're pretty dumb to be laughing
what, the array that you can store in a file to make it cleaner but it wasn't the purpose of the video?
Hell yeah, pretty trash code innit 😎, but the point of the video was to make something that works, not something that the google coding team would approve of
ik improving it will make it a bit better to read and faster to execute but that doesn't matter for the current task
This is pretty badly coded ngl and a simple ip block and algorithm check of the words will filter out 99% of the fakes. You could use a proxy for the ip blocking but the othwr problem still exists, also it (most likely) wont be them putting in the data manually it will be automated making it alot faster to sort through and find real ones. Also if you wanted it faster use threading
ok then, improve it.
You need to use threading or async for request.
my ethernet & i9-13900kf is doing some work..
Im going to do 1,000x at 32 threads and starting a stopwatch... (10:59.99 for 32k)
What happens when you actually send a seed phrase with millions of dollars
money gone