SALES, RENTALS & LAYAWAYS

PROTECTING EVERYTHING THAT HAS EVER BEEN OF VALUE TO YOU

Open 24/7/365

We Have A Life-Time Warranty /
Guarantee On All Products. (Includes Parts And Labor)

How To Use Ian Coleman’s BIP39 Tool For Finding Bitcoin Addresses And Private Keys From A Seed Phrase

In this guide, we are going to use a specialized tool for examining a seed phrase that likely came from a hardware wallet or wallet software. How To Use Ian Coleman’s BIP39 Tool For Finding Bitcoin Addresses And Private Keys From A Seed Phrase

From the seed phrase, this tool can reveal individual bitcoin addresses and private keys in their raw form. The raw form can then be used as input for other operations such as using tools to claim forked coins.

Introduction

Do be warned that entering your seed phrase into a tool is a compromise of the security of the original device. If you have the device to protect your security, this is a move in the other direction. It is highly advisable that if you have the means to move your BTC using the ‘normal’ way with your device or wallet, do that first.

Once that is done, this tool can be helpful for a number of things like helping you reconstructing a complex transaction record and getting value from lower-value forked coins that still may be associated with the keys.

Securely Using This Tool With Your Private Seed Phrase

This article is to instruct you on the tool, however when it comes to actually using your real seed phrase that holds your money. We suggest making sure you have an adequately secure environment for doing so. We have a guide for setting up an temporary Ubuntu live boot session that is far less likely to have malware or accidentally leak your keys. We also have a guide for downloading and running this tool offlinein that Ubuntu environment.

If you are a more advanced user and/or you have more need for caution, using TAILS over Ubuntu might be desirable. We also have an equivalent guide for setting up TAILS and downloading and running the BIP39 tool.

What Is Your Seed Phrase?

If you got a 12, 13, 24, or 25 word recovery seed phrase when setting up your wallet, it is most likely a standard BIP39 mnemonic which is a standard, well-defined way of keeping a private key. The reason it makes sense for the wallet developers to use this scheme is that it is an open, well-scrutinized scheme that is reviewed for security. But also, so it allows you to access your money in the absence of their wallet due to unforeseen circumstances, which is a selling feature. The latter is exactly what Ian Coleman’s BIP39 app is designed to do.

The popular wallets that use BIP39 for the mnemonic scheme include Trezor, Ledger, Electrum, Mycelium, Bither, Coinomy, and MyEtherWallet.

Your seed phrase directly maps to a 128-bit or 256-bit randomly-generated number that should be known to only you. The private keys that control balances for BTC or other coins are derived from this value. The specifics of this are covered by BIP32 and BIP44, however this is far easier to understand experientially playing with the BIP39 tool.

Playing With The Tool Via The Web

To get a feel for the tool, you can use directly through the web by going to the site. However, we don’t recommend typing your seed phrase into a web site on your everyday-use PC. It is alright to use seed phrases that don’t have money associated, though.

How To Use Ian Coleman's BIP39 Tool For Finding Bitcoin Addresses And Private Keys From A Seed Phrase

 

How To Use Ian Coleman's BIP39 Tool For Finding Bitcoin Addresses And Private Keys From A Seed Phrase

For 12-word seed phrases all twelve go in the BIP39 Mnemonic field and the BIP39 Passphrase field is left blank. For 24-word seed phrases, the BIP39 Passphrase field is also left blank. For 13-word and 25-word seed phrases, the last word of the sequence goes in the BIP39 Passphrase as is the case with the word TREZOR in the example.

Looking At Derived Addresses

If you scroll down past the middle section (we will get back to that shortly), in the Derived Addresses section, we will see a table that includes public Bitcoin addresses, public keys and private keys:

If your wallet adheres to BIP44, these should be the list of addresses your wallet gives for a receiving address for incoming payments. If you have lost the records for which addresses you have transacted with, this is the set you can check against a block explorer (though, to protect your privacy you should do it safely with Tor Browser in a secure environment).

The Private Key field is the value you need to spend the coin balance on the associated public address using wallet tools other than the wallet the seed phrase is from. For example, Electrum or the bitcoin_fork_claimer tool use these keys to send transactions.

Segwit Addresses

If you have a newer wallet that is using Segwit addresses that start with a 3, to get the Segwit addresses, you should use the BIP141 tab under the Derivation Path section instead of the BIP44 path.

Spend vs Change addresses

If we scroll back up to the middle Derivation Path section, there are a lot of settings to play with that modify how the keys are derived. We aren’t going to attempt to explain it all here. If you have trouble finding the addresses and keys you expect, researching some specifics of the brand of your wallet may shed some light on on which settings are appropriate.

However, there is one important concept that likely applies to you that doesn’t have a clear name. The Internal/External field can either be set to 1 or 0.

If you set it to 1, it generates a different set of addresses below. These are the addresses your BIP44-conforming wallet is supposed to use to send leftover ‘change’ from transactions to. For example, if you held 0.1 BTC on address A from an address generated to receive from the wallet (Internal/External = 0) and then sent 0.03 BTC to your friend at address B, the wallet would take an address from the Change Address list C and then send the remainder 0.07 BTC (minus the fee) there. You control A and you control C, but A came from the Internal/External = 0 list, but C came from the Internal/External = 1 list.

How To Use Ian,How To Use Ian,How To Use Ian,How To Use Ian,How To Use Ian,How To Use Ian,How To Use Ian,How To Use Ian,

 

Related Articles:

A New Ransomware Enters The Fray: Epsilon Red

This Massive Phishing Campaign Delivers Password-Stealing Malware Disguised As Ransomware

Biden Proposes Billions For Cybersecurity After Wave of Attacks

Mobile Crypto ‘Mining’ App Possibly Connected To Personal Data Leak

Ireland Confirms Second Cyber Attack On Health System

US Unveils Plan To Protect Power Grid From Foreign Hackers

Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals

A Hacker Was Selling A Cybersecurity Exploit As An NFT. Then OpenSea Stepped In

Clubhouse And Its Privacy & Security Risk

Using Google’s ‘Incognito’ Mode Fails To Prevent Tracking

Kia Motors America Victim of Ransomware Attack Demanding $20M In Bitcoin, Report Claims

The Long Hack: How China Exploited A U.S. Tech Supplier

Clubhouse Users’ Raw Audio May Be Exposed To Chinese Partner

Hacker Changed Chemical Level In Florida City’s Water System

UK Merger Watchdog Suffers 150 Data Breaches In Two Years

KeepChange Foils Bitcoin Theft But Loses User Data In Sunday Breach

Hacker Refuses To Hand Police Password For Seized Wallet With $6.5M In Bitcoin

SonicWall Says It Was Victim of ‘Sophisticated’ Hack

Tor Project’s Crypto Donations Increased 23% In 2020

Read This Now If Your Digital Wallet Which Holds Your Crypto-currencies Can Be Accessed Through Cellular, Wifi, Or Bluetooth

Armed Robbers Steal $450K From Hong Kong Crypto Trader

Is Your iPhone Passcode Off Limits To The Law? Supreme Court Ruling Sought

Researchers Warn 3 Apps Have Been Stealing Crypto Undetected For A Year

Ways To Prevent Phishing Scams In 2020

The Pandemic Turbocharged Online Privacy Concerns

US Treasury Breached By Foreign-Backed Hackers

FireEye Hack Portends A Scary Era Of Cyber-Insecurity

How FinCEN Became A Honeypot For Sensitive Personal Data

Apple And Google To Stop X-Mode From Collecting Location Data From Users’ Phones

Surge In Physical Threats During Pandemic Complicates Employee Security Efforts

Imagine A Nutrition Label—for Cybersecurity

Cybercriminals Attack GoDaddy-based Cryptocurrency Platforms

Biden Team Lacks Full U.S. Cybersecurity Support In Transition Fracas

Nasdaq To Buy Anti-Financial Crime Firm Verafin For $2.75 Billion

Mysterious Software Bugs Were Used To Hack iPhones and Android Phones and No One Will Talk About It

Dark Web Hackers Say They Hold Keys To 10,000 Robinhood Accounts #GotBitcoin

Hackers Steal $2.3 Million From Trump Wisconsin Campaign Account

Crypto Scammers Deface Trump Campaign Website One Week From Elections

Telecoms Protocol From 1975 Exploited To Target 20 Crypto Executives

With Traders Far From Offices, Banks Bring Surveillance To Homes

Financial Systems Set Up To Monitor Unemployment Insurance Fraud Are Being Overloaded (#GotBlockchain?)

A Millionaire Hacker’s Lessons For Corporate America

Container Shipping Line CMA CGM Says Data Possibly Stolen In Cyberattack

Major Hospital System Hit With Cyberattack, Potentially Largest In U.S. History

Hacker Releases Information On Las Vegas-Area Students After Officials Don’t Pay Ransom

Russian Troll Farms Posing As African-American Support For Donald Trump

US Moves To Seize Cryptocurrency Accounts Linked To North Korean Heists

These Illicit SIM Cards Are Making Hacks Like Twitter’s Easier

Uber Exec Allegedly Concealed 2016 Hack With $100K BTC ‘Bug Bounty’ Pay-Off

Senate Panel’s Russia Probe Found Counterintelligence Risks In Trump’s 2016 Campaign

Bockchain Based Surveillance Camera Technology Detects Crime In Real-Time

Trump Bans TicToc For Violating Your Privacy Rights While Giving US-Based Firm Go Ahead (#GotBitcoin?)

Facebook Offers Money To Reel In TikTok Creators

How A Facebook Employee Helped Trump Win—But Switched Sides For 2020

Facebook Rebuffs Barr, Moves Ahead on Messaging Encryption

Facebook Ad Rates Fall As Coronavirus Undermines Ad Spending

Facebook Labels Trump Posts On Grounds That He’s Inciting Violence

Crypto Prediction Markets Face Competition From Facebook ‘Forecasts’ (#GotBitcoin?)

Coronavirus Is The Pin That Burst Facebook And Google Online Ads Business Bubble

OpenLibra Plans To Launch Permissionless Fork Of Facebook’s Stablecoin (#GotBitcoin?)

Facebook Warns Investors That Libra Stablecoin May Never Launch (#GotBitcoin?)

FTC Approves Roughly $5 Billion Facebook Settlement (#GotBitcoin?)

How Facebook Coin’s Big Corporate Backers Will Profit From Crypto

Facebook’s Libra Is Bad For African Americans (#GotBitcoin?)

A Monumental Fight Over Facebook’s Cryptocurrency Is Coming (#GotBitcoin?)

Alert! 540 Million Facebook Users’ Data Exposed On Amazon Servers (#GotBitcoin?)

Facebook Bug Potentially Exposed Unshared Photos of Up 6.8 Million Users (#GotBitcoin?)

Facebook Says Millions of Users’ Passwords Were Improperly Stored in Internal Systems (#GotBitcoin?)

Advertisers Allege Facebook Failed to Disclose Key Metric Error For More Than A Year (#GotBitcoin?)

Ad Agency CEO Calls On Marketers To Take Collective Stand Against Facebook (#GotBitcoin?)

Thieves Can Now Nab Your Data In A Few Minutes For A Few Bucks (#GotBitcoin?)

New Crypto Mining Malware Beapy Uses Leaked NSA Hacking Tools: Symantec Research (#GotBitcoin?)

Equifax, FICO Team Up To Sell Your Financial Data To Banks (#GotBitcoin?)

Cyber-Security Alert!: FEMA Leaked Data Of 2.3 Million Disaster Survivors (#GotBitcoin?)

DMV Hacked! Your Personal Records Are Now Being Transmitted To Croatia (#GotBitcoin?)

Lithuanian Man Pleads Guilty In $100 Million Fraud Against Google, Facebook (#GotBitcoin?)

Hack Alert! Buca Di Beppo, Owned By Earl Enterprises Suffers Data Breach Of 2M Cards (#GotBitcoin?)

SEC Hack Proves Bitcoin Has Better Data Security (#GotBitcoin?)

Maxine Waters (D., Calif.) Rises As Banking Industry’s Overseer (#GotBitcoin?)

FICO Plans Big Shift In Credit-Score Calculations, Potentially Boosting Millions of Borrowers (#GotBitcoin?)

Our Facebook Page

Your Questions And Comments Are Greatly Appreciated.

Monty H. & Carolyn A.

Go back

Leave a Reply