You can add a rotating proxies functionality so they don't filter out your requests from IP and just ignore them all, you could also probably put those words_array into a file and read the file instead of having it in your text editor like that or use an API or use webscraping.. whatever floats your boat.
@kezif12 күн бұрын
rotating proxies cost money :(
@If0n70212 күн бұрын
You can get free proxy list lmfao @@kezif
@whetfaartz668512 күн бұрын
@@kezif No they don't, look up free proxies or free socks4/5 proxies, free http proxies, free https proxies... there's forums that have like 5000+ proxies just freely available, just look around and you'll see 'em.
@dec1lent44812 күн бұрын
@@kezif The bandwidth is minimal with requests, if the scammer doesnt block free proxies. Just have a function call, to check if the proxies are working, add those that where working (within a given time,) to another list. Then iterate over said list.
@distortions12 күн бұрын
@@kezif theres a lot of free proxies on the internet
@__Brandon__12 күн бұрын
And then they will write a quick script to throw away all the seed phrases that don't pass the checksum which 1 in 2048 won't. And with the remaining ones they will automatically scan for a balance and withdrawal any funds that have a balance. Anyone who knows what they are doing won't even save the seed to a database unless the seed generates an address that has funds on it. This is a decent denial of service as it's wasting their resources more than it's wasting your resources, but it's definitely not going to put a stop to them. If anything they w do a simple IP ban after getting more than 5 submissions from the same ip within a couple minutes which will completely negate this entire denial of service
@bubby159512 күн бұрын
remember, these guys are braindead and are only after money.
@ibrahimdevx12 күн бұрын
However most scammers r just Indian/African script kiddies using public phishing code and making a website like this who dont have much technical knowledge to do allat, so it would slow them down
@OmikronClient12 күн бұрын
@@ibrahimdevx ye
@ManWhoLostTheWar12 күн бұрын
well what about using multi threading and using proxies?
@whetfaartz668512 күн бұрын
This is true, do you have an alternative option to fucking with scammers? (also I heavily agree with @ibrahimdevx)
@DerMarkus198212 күн бұрын
"Welcome to ScammerJam 2024. How many of 'em can YOU jam?" came to mind...
@DigitalWealth4Everyone12 күн бұрын
Nice video. Done the exact same concept but on scammers using fake shops and stealing debit/credit card info. made a similar script but randomly created 16 digits an checked if it was accepted by the Luhn algorithm. Sent hundreds of thousands until there website was rate limited and shutdown.
@afadeevz13 күн бұрын
Don't forget to place input vars in same order. Scammers will be able to detect your requests
@feiks42012 күн бұрын
in post_data, you could most likely optimise it with a cheeky for loop to make the code ever cleaner
@virxs12 күн бұрын
i love how you actually teach us python along the way! Much love g
@the5dollarwrench11 күн бұрын
Thank you virxs
@virxs11 күн бұрын
@@the5dollarwrench no worries
@cool_604212 күн бұрын
That's genius!!! After watching I created a similar program, but it generates credit cards (that pass the luhn check) and spams those.
@enderagent11 күн бұрын
The website database probably stores the IP or user agent (python requests user agent) per request so they will just be able to drop all records that match an IP or the user agent for python requests. Nice idea though
@YouLolNotLolYou11 күн бұрын
Yeah, you can edit the code and use proxy list and random user agent :) Eazy
@enderagent11 күн бұрын
@@YouLolNotLolYou The website owner could just audit the logs. All the proxy IPs that made more than one request in a certain period of time can just be removed
@YouLolNotLolYou11 күн бұрын
@@enderagent you can buy pool of 20k ips for few bucks :)
@enderagent11 күн бұрын
@@YouLolNotLolYou Which the person in the video did not do, so my original message stands
@YouLolNotLolYou11 күн бұрын
Yeah
@ClifffSVK11 күн бұрын
Now imagine if your script randomly generated someone's actual seed phrase 😬
@Zetornator12 күн бұрын
I wanted to do a similar thing with bank scams though i was worried the scammers would iust save the ip and remove all answers from the same ip
@mxrtoe12 күн бұрын
they do that
@al-ft1ng12 күн бұрын
Anyone with a brain would automatically check for an address with balance whenever their server is hit with a seed, and then only make it notify them if balance is found, and they would also place a rate limit. Using proxies and separating the requests time would be wiser. But then again you're wasting money to do little to no damage to their operations.
@the5dollarwrench10 күн бұрын
This would imply seed phrase scammers have a brain
@kihok868812 күн бұрын
Scammer will filter out all your entries by IP when you send that many..
@LoloisKali12 күн бұрын
Bro ty for the idea and honestly im gonna do this. I love this its ez concept :)
@the5dollarwrench12 күн бұрын
Thank you
@zrizzy695812 күн бұрын
It's a really nice idea, though I'm not sure if they are just using the last wallet you sent... They might get only one
@the5dollarwrench12 күн бұрын
it prints out the wallet sent and its a new one each time
@shadowplay5612 күн бұрын
When I tried to use it, it didn't work with IDLE, so I used it with VSC, where it then worked. If it doesn't work with IDLE, and you have requests installed, use VSC
@the5dollarwrench12 күн бұрын
Glad you found another solution!
@hygienicturtle12 күн бұрын
What if you left this running for long enough that it generated someones actual combination
@the5dollarwrench11 күн бұрын
You would have to wait many many many many many many many many many many many many many many many many many many many many many many many many many many many thousands of years
@herofahad77711 күн бұрын
but that might also generate a live wallet?
@1slyzz110 күн бұрын
yea but the chance is likee winning a jackpot and thee scammers can generatee random walllets themselves
@herofahad77710 күн бұрын
@@1slyzz1 oh ok
@jan_harald12 күн бұрын
at least with firefox, a way easier and nicer approach would be just right-click in the network tab, and copy POST values, and using that, directly, in the script it seems to include a lot more than just the post data, which is useful, e.g. you would definitely want to fake a real browser user-agent, else it's TRIVIAL for them to just throw out every input submitted by a certain user-agent, but if you use your real user-agent, then they'd have to ban everyone with that browser, and if you upgrade browser, it'd change too tho downside, the format will change depending on the actual format, e.g. whether it's form-endoced, or json-encoded, but it'd still be easy enough, I think
@LoloisKali12 күн бұрын
Also subbed
@LinguisticMirage12 күн бұрын
Scammer gets scammed
@quickmoment122219 күн бұрын
How dont you get 429?
@the5dollarwrench9 күн бұрын
?
@HaeImAlan12 күн бұрын
What are the odds of you accidentally guessing someone’s seed phrase
@m4chb00m512 күн бұрын
I approximated that there are 1962 words, 109 columns with 18 in a row, with some simple math we can estimate that the chance is : 1 in 9.19×10⁷⁸. Even if he will send 1 trilion requests the probability, is similar to guessing a specific atom across the universe.
@the5dollarwrench12 күн бұрын
You would have a better chance of winning the lottery 100 times in a row
@HaeImAlan12 күн бұрын
@@the5dollarwrench damn that’s low
@cameramaker12 күн бұрын
The poor granny who's address you guessed right :D
@VoltVentures12 күн бұрын
suboptimal development
@the5dollarwrench12 күн бұрын
🤓
@kezif12 күн бұрын
let the guy cook
@VoltVentures12 күн бұрын
@@kezif ong ong
@uropig12 күн бұрын
lol
@ckpioo13 күн бұрын
this is why people need to stop using python, see that code at the beginning?
@lxcyfxr511913 күн бұрын
Yeah, it's HTML 😂
@ckpioo13 күн бұрын
@@lxcyfxr5119 0:12 you're pretty dumb to be laughing
@tastyham13 күн бұрын
what, the array that you can store in a file to make it cleaner but it wasn't the purpose of the video?
@the5dollarwrench12 күн бұрын
Hell yeah, pretty trash code innit 😎, but the point of the video was to make something that works, not something that the google coding team would approve of
@FurqanHun12 күн бұрын
ik improving it will make it a bit better to read and faster to execute but that doesn't matter for the current task
@expl0siveR3x10 күн бұрын
This is pretty badly coded ngl and a simple ip block and algorithm check of the words will filter out 99% of the fakes. You could use a proxy for the ip blocking but the othwr problem still exists, also it (most likely) wont be them putting in the data manually it will be automated making it alot faster to sort through and find real ones. Also if you wanted it faster use threading
@the5dollarwrench10 күн бұрын
ok then, improve it.
@sweetshit493112 күн бұрын
You need to use threading or async for request.
@cozmoticskillissue12 күн бұрын
my ethernet & i9-13900kf is doing some work.. Im going to do 1,000x at 32 threads and starting a stopwatch... (10:59.99 for 32k)
@user-yd8ys4fe2h10 күн бұрын
What happens when you actually send a seed phrase with millions of dollars