Running this command, you can test a lot of derivation paths as to find the exact derivation path of the address you need to recover. Will display the Wallet Address as well as the Redeem Script and Output Script in human readable format. Using your cosigner wallet's mnemonics, it is possible to recover the Copay Multisig Wallet produced at derivation path X. change "143f5QPkc5mJurEr2kGPPoecJqkhvaQ2u2 " \ destination "1Ajqkh2foqMGLRAe9YkS7mwMgsAEiAx3aM " \ cosig3= "this third mnemonic is optional " \ cosig2= "nor is this one because crazy " \ cosig1= "this is not the right mnemonic " \ (Inputs are always Outputs in a previous transaction) Which turns out to be at derivation path m/44'/0'/0'/1/0.Īfter gathering the right data about those inputs, I then ran the following command providing -input1 and -input2 are transaction IDs of the transaction in which your inputs are the outputs. The second input was located in the first change address of the CoPay wallet. Which turns out to be at derivation path m/44'/0'/0'/0/2. In my case, the first input was located in the third address of the CoPay wallet. Public/private key Pairs for each Input we need to sign. Because both inputs are different Bitcoin Addresses we will need different FollowingĪre details about HD Key derivation paths needed to sign those 2 inputs. The created transaction uses 2 Inputs because I needed an address from which I would pay the Bitcoin Fee for processing the transaction. I have proceeded to a recovery of 8 USDT from a CoPay Multisig Wallet to a Bittrex wallet which you can see in details on the following $ php application script:op-return -asm= "OP_RETURN 6f6d6e69000000000000001f000000002faf0800 OP_EQUAL " Example of USDT (Omnilayer) recovery on CoPay Multisig Wallet $ php application wallet:derive -mnemonic= "abandon abandon abandon " -password= "mySecurePassword " -path= "m/0'/0' " # Parse a OP_RETURN colored coin hexadecimal payload (Omnilayer or any other OP_RETURN content) $ php application wallet:derive -mnemonic= "abandon abandon abandon " -path= "m/44'/0'/0'/0 " # Get BIP32 Addresses protected by password (Bitcoin Core) : $ php application wallet:derive -mnemonic= "abandon abandon abandon " # Get BIP44 Addresses, Public Keys and Private Keys # Get BIP39 Seed from Mnemonic as well as BIP32 Root Key : $ php application wallet:hd-from-xpub -xpub= "xpub123456 " # Get Multisig HD Address from BIP32 Extended Public Keys of cosigners # Get Simple HD Address from BIP32 Extended Public Key
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |