LCP_hide_placeholder
fomox
MarketsPerpsSpotSwapMeme Referral
More
Smart Money Recruitment
Search Token/Wallet
/

Pi Network Passphrase: Security and Best Practices

2026-01-21 02:02:29
Blockchain
Crypto Ecosystem
Crypto Tutorial
Web 3.0
Web3 wallet
Article Rating : 4
19 ratings
This comprehensive guide explores essential strategies for securing your Pi Network wallet passphrase, the cryptographic key protecting your digital assets. The article explains what passphrases are, why they matter in decentralized finance, and their role following industry BIP39 standards. It provides actionable steps for generating, confirming, and physically storing your passphrase safely. Key recommendations include writing passphrases on archival paper, storing multiple copies in separate secure locations like safes or bank deposit boxes, and never sharing with anyone. The guide emphasizes that unlike traditional banking, there's no password recovery option—your passphrase represents irreversible control over your Pi holdings. Additional security measures include avoiding digital storage, regular recovery testing, and proper inheritance planning. By implementing these best practices from day one, Pi Network users can confidently protect their digital wealth while maintaining sole custody and control.
Pi Network Passphrase: Security and Best Practices

Introduction: Safeguarding Your Pi Network Experience

The world of decentralized finance and cryptocurrency brings a unique set of responsibilities to every participant. Perhaps one of the most misunderstood yet crucial elements is the wallet security mechanism — specifically, the passphrase. For Pi Network users, the passphrase represents more than a mere password; it's the linchpin that keeps your digital assets safe, ensuring only you have access to your Pi Wallet.

In an industry where irreversible loss is just one misstep away, understanding and managing your Pi Network passphrase is non-negotiable for both new and experienced users. Unlike traditional financial systems where customer support can reset passwords or recover accounts, the decentralized nature of blockchain technology means that you, and only you, hold the keys to your digital wealth. This fundamental shift in responsibility requires a corresponding shift in how we approach security practices.

The importance of passphrase security cannot be overstated. Every year, millions of dollars worth of cryptocurrency are lost forever due to misplaced, forgotten, or compromised passphrases. By understanding the critical role your Pi Network passphrase plays and implementing robust security measures from the outset, you can confidently participate in the Pi ecosystem while protecting your hard-earned digital assets.

What is the Pi Network Passphrase?

In the crypto universe, a passphrase is a series of randomly generated words, often following the BIP39 standard for mnemonic phrases, used to secure and recover wallet access. In Pi Network, your passphrase acts as the only way to gain entry to your on-chain Pi Wallet, granting access to your private keys and the cryptocurrency stored within. Think of it as a master key — anyone possessing it can control your funds.

The passphrase typically consists of 12 to 24 words selected from a standardized dictionary of 2,048 words. This seemingly simple sequence of everyday words actually represents an incredibly secure cryptographic key. The mathematical probability of someone randomly guessing your passphrase is astronomically low, making it one of the most secure authentication methods available when properly managed.

What makes the passphrase particularly powerful is its dual function: it serves both as a security mechanism and a recovery tool. If you ever need to restore your wallet on a new device, migrate to a different wallet application, or recover access after device loss, your passphrase is the only thing you need. This portability and universality make it an elegant solution to the complex problem of securing digital assets.

Why Does the Passphrase Matter?

  • Irreversible Control: Unlike traditional banking, there is no 'forgot password' option. If lost, there's no way to recover your wallet or assets. No customer service representative, no password reset email, and no security questions can help you regain access. This permanence underscores the critical importance of proper passphrase management from day one.

  • Self-custody: The passphrase enables true ownership of your Pi, completely removing third-party risk, but also making personal responsibility paramount. You are not relying on any company, institution, or intermediary to safeguard your funds. This independence is liberating but demands a corresponding level of diligence and security awareness.

  • Universal Access: Your passphrase works across compatible wallet applications, meaning you're not locked into a single service provider. This interoperability is a cornerstone of decentralized finance, giving you flexibility and control over how you manage your digital assets.

Historical Context and Industry Standards

The concept of a mnemonic passphrase did not originate with Pi Network; it is now widespread in crypto, popularized by Bitcoin and Ethereum wallet standards. Cryptographic passphrases evolved as the easiest yet most secure means for users to back up and restore access to decentralized wallets while maintaining privacy and security.

The journey from complex cryptographic keys to user-friendly passphrases represents a significant milestone in making cryptocurrency accessible to mainstream users. In the early days of Bitcoin, users had to manage long hexadecimal strings of characters representing their private keys. A single typo or lost character meant permanent loss of funds, creating a significant barrier to adoption.

From Private Keys to Passphrases

Manually managing hexadecimal private keys was once standard, but complexity and human error led to the creation of user-friendly, multi-word passphrases. In recent years, nearly all leading wallets — including mainstream Web3 tools — utilize this method, reinforcing its critical importance industry-wide.

The BIP39 standard, introduced in 2013, revolutionized wallet security by creating a standardized method for generating mnemonic phrases. This standard ensures that passphrases generated by one wallet application can be used to recover funds in another compatible wallet, creating true interoperability in the cryptocurrency ecosystem. The adoption of this standard by Pi Network demonstrates its commitment to following industry best practices and ensuring user security.

The evolution from private keys to mnemonic passphrases also addressed another critical issue: human memory limitations. While remembering a 64-character hexadecimal string is nearly impossible, a sequence of 12-24 common words is far more manageable, though still requiring careful documentation and storage.

How to Generate and Safeguard Your Pi Network Passphrase

Step 1: Generation During Wallet Creation

When activating your Pi Wallet, the application prompts you to generate your unique passphrase. This usually consists of 12-24 words, arranged in a specific sequence. The generation process uses cryptographically secure random number generation to ensure that your passphrase is truly unique and unpredictable.

During this critical moment, it's essential to be in a private, secure environment. Avoid generating your passphrase in public spaces, on shared computers, or anywhere someone might observe your screen. The moment of creation is when your passphrase is most vulnerable to exposure, so treat it with the same care you would when entering a bank vault combination.

Key Tips:

  • Write your passphrase down immediately during creation, using pen and paper rather than digital methods.
  • Never take screenshots or store it on internet-connected devices, as these can be compromised by malware or hacking.
  • Verify each word carefully as you write it down, ensuring correct spelling and order.
  • Use clear, legible handwriting to prevent future misreading of similar-looking words.

Step 2: Confirm the Passphrase

Wallet apps, including those supporting Pi Network, often require you to re-enter selected words from your passphrase to verify that it's recorded correctly. This confirmation is your only assurance that you've accurately captured your passphrase before finalizing wallet creation.

This verification step might seem tedious, but it's a critical safeguard against transcription errors. Take your time during this process, double-checking each word against your written backup. A single incorrect word will render your entire passphrase useless for future recovery attempts. Some users find it helpful to verify their backup multiple times before proceeding, ensuring absolute accuracy.

Consider this confirmation step as your last chance to catch any errors while you still have access to the correct passphrase displayed on screen. Once you complete wallet setup, the passphrase will never be shown again, making any errors in your backup potentially catastrophic.

Step 3: Secure Physical Storage

The most recommended practice is to write your passphrase legibly on paper, store it in a tamper-proof envelope, and place it in a secure, fireproof location (such as a safe or lockbox). Some users opt for engravings on metal plates for added durability against fire, water, and physical degradation.

Physical storage remains the gold standard for passphrase security because it eliminates digital attack vectors entirely. However, physical storage comes with its own considerations. Paper can deteriorate over time, especially in humid environments, and can be destroyed by fire or water. For long-term storage, consider using archival-quality paper or, for maximum durability, metal backup solutions specifically designed for cryptocurrency passphrases.

When choosing a storage location, balance accessibility with security. Your passphrase should be readily available when you need it for legitimate purposes, but not so accessible that others might stumble upon it. A home safe offers a good compromise, providing protection against casual discovery while remaining accessible in emergencies.

Practical Example: Backing Up Your Pi Network Passphrase

Suppose you install a mainstream Web3 wallet for managing your various crypto assets, including Pi Network. During setup, you're given a 24-word passphrase. Understanding the critical importance of this information, you implement a comprehensive backup strategy:

  1. Write it down on two separate pieces of archival-quality paper, using permanent ink and clear block letters.
  2. Place one copy in your home safe, stored in a waterproof and fireproof document bag.
  3. Give another copy to a trusted relative, instructing them to lock it away in a safety deposit box at their bank.

This redundancy ensures that accidental loss—such as fire, flood, or theft—does not equate to permanent loss of your digital currency. The geographic separation of your backups protects against localized disasters, while the involvement of a trusted party provides an additional layer of security without compromising your sole control over the funds.

Some users take this strategy even further by creating three or more copies, storing them in different locations such as a lawyer's office, a safety deposit box, and a home safe. The key is finding the right balance between redundancy and security—too few backups increase loss risk, while too many copies increase the risk of unauthorized access.

Additional Security Tips and Notes

1. Never Share With Anyone

No legitimate wallet provider, including mainstream crypto wallet services, will ever ask for your passphrase. Sharing it, even with support staff or under false pretenses, can lead to immediate loss of your holdings. This rule has no exceptions.

Scammers frequently impersonate wallet support staff, exchange representatives, or Pi Network officials, creating elaborate schemes to trick users into revealing their passphrases. These attacks often come through email, social media, or fake customer support websites. Remember: your passphrase is like the combination to your personal vault—no legitimate service provider needs or wants this information.

If someone claims they need your passphrase to "verify your account," "fix a technical issue," or "upgrade your wallet," they are attempting to steal your funds. Immediately cease communication and report the incident to the appropriate authorities and the genuine Pi Network support channels.

2. Digital Storage Risks

Storing your passphrase in plaintext files, cloud notes, emails, or phone photo galleries exposes you to malware, phishing, or device theft. Hackers specifically look for such weak points, often using automated tools to scan for common passphrase patterns.

Cloud storage services, while convenient, are particularly risky because they create multiple copies of your data across various servers, each representing a potential point of compromise. Even encrypted cloud storage can be vulnerable if your account credentials are compromised through phishing or data breaches.

Similarly, storing passphrases in smartphone notes apps or photo galleries puts your funds at risk if your device is lost, stolen, or compromised by malware. Mobile devices are particularly vulnerable because they're frequently connected to public Wi-Fi networks and may have numerous apps installed, any of which could potentially access your stored data.

3. Consider a Password Manager (With Caution)

Some advanced users leverage offline password managers with strong encryption, but this introduces a single point of failure. It's only advisable if you understand the risks and regularly maintain backups of both the password manager database and its master password.

If you choose this route, use a reputable, open-source password manager that stores data locally rather than in the cloud. Ensure the password manager itself is protected by a strong, unique master password that you've memorized (never written down in the same location). Additionally, maintain encrypted backups of your password manager database in multiple secure locations.

The advantage of this approach is convenience—you can securely store multiple passphrases and access them when needed. However, the disadvantage is that compromising your password manager means compromising all your stored passphrases simultaneously. This method is generally recommended only for technically sophisticated users who understand encryption and regularly update their security practices.

4. Regularly Test Wallet Recovery

Periodically, attempt recovery on a test device or with a compatible wallet app (never uninstall your primary wallet without confirming). This validates practice and gives confidence that your backup is functional and you can correctly execute the recovery process when needed.

Many users discover too late that they've incorrectly recorded their passphrase or don't remember the exact recovery procedure. By testing your backup while you still have access to your funds through your primary wallet, you can identify and correct any issues before they become critical.

When conducting recovery tests, use a separate device if possible, or create a new wallet instance specifically for testing. Document the recovery process, noting any steps that seem confusing or unclear. This documentation will be invaluable if you ever need to perform an actual recovery under stressful circumstances.

5. Use Multiple Backups and Obfuscation

Make several copies, but consider encoding portions or storing the backup phrase across locations to prevent tampering or accidental discovery by unauthorized persons. Some users split their passphrase into multiple parts, storing each segment in different locations.

For example, you might store words 1-8 in one location, words 9-16 in another, and words 17-24 in a third location. This approach ensures that someone discovering one backup cannot access your funds without obtaining all segments. However, this strategy also increases complexity and the risk that you might lose access to one segment.

Another approach is to use simple obfuscation techniques, such as storing your passphrase alongside decoy words or using a personal encoding system. However, be cautious with overly complex obfuscation schemes—they can backfire if you forget your own system or if heirs need to access your funds after your passing.

6. Be Prepared for Legacy and Inheritance Planning

Consider documenting, under legal and secure conditions, instructions for trusted heirs. Digital asset inheritance requires thoughtful planning to avoid funds becoming lost in perpetuity. Unlike traditional assets that automatically pass through probate, cryptocurrency can be permanently lost if heirs don't have access to passphrases.

Work with an estate planning attorney familiar with digital assets to create a comprehensive plan. This might include sealed instructions stored with your will, a trusted executor who understands cryptocurrency, or specialized digital asset inheritance services. Ensure your heirs understand the basic concepts of cryptocurrency security and recovery, even if they don't need the specific passphrase until after your passing.

Some users create detailed instruction documents explaining how to access and manage their digital assets, storing these instructions with their estate planning documents. Others use multi-signature wallets or time-locked contracts to provide additional security while ensuring heirs can eventually access funds.

Final Thoughts: Making Security a Habit

The Pi Network passphrase is far more than an afterthought. Its management defines your experience and risk level in the decentralized digital asset space. As sophisticated phishing attempts and scams proliferate, being methodical and disciplined with your passphrase is your strongest defense.

Choose reputable wallets such as mainstream Web3 wallet solutions for a robust experience, and commit to best practices around passphrase handling from day one. Every cryptocurrency success story starts with secure self-custody — and nothing is more foundational than your passphrase.

When you take control of your digital keys, you are truly participating in the future of money. Don't let a simple oversight be the reason your journey ends before it begins. Make passphrase security a daily habit, and peace of mind will follow. The decentralized future promises unprecedented financial freedom and opportunity, but only for those who take security seriously and implement proven best practices consistently.

Remember that security is not a one-time setup but an ongoing practice. Regularly review your backup strategies, stay informed about emerging security threats, and continuously educate yourself about best practices in cryptocurrency security. Your Pi Network passphrase represents not just access to digital currency, but your gateway to participating in a revolutionary financial system—protect it accordingly.

FAQ

What is Pi Network's Passphrase and what does it do?

Pi Network's Passphrase is a security backup phrase consisting of words that protects your Pi wallet and account. It allows you to recover your account if you lose access to your device. Keep it secure and never share it with anyone.

What is the difference between Pi Network Passphrase and ordinary passwords?

Pi Network Passphrase is a blockchain-specific security mechanism designed for cryptocurrency wallets, offering enhanced protection through multi-word composition and cryptographic verification. Unlike ordinary passwords, it's specifically engineered for secure key management and recovery, providing stronger resistance against attacks and unauthorized access to digital assets.

How to create a secure Pi Network Passphrase?

Use a combination of uppercase, lowercase, numbers, and special characters. Make it at least 12 characters long, avoid personal information, and store it securely offline. Never share your passphrase with anyone.

What should I do if my Passphrase is lost or leaked? Can it be recovered?

If your Passphrase is lost, recovery is not possible as it cannot be reset. If leaked, immediately secure your account and change associated credentials. Treat your Passphrase like a private key—never share it and store it securely offline.

What are the best methods for saving Pi Network Passphrase?

Store your passphrase in a secure offline location like a hardware wallet, encrypted password manager, or physical safe. Never share it online or with anyone. Keep multiple backup copies in separate secure locations for recovery purposes.

Why must you properly safeguard your Passphrase when using Pi Network?

Your Passphrase is the master key to your Pi Network wallet. Losing or compromising it means permanent loss of access to your Pi assets and funds. Never share it with anyone, store it securely offline, and keep multiple backups in safe locations.

What is the relationship between Passphrase and private key in Pi Wallet?

Passphrase is a user-friendly security layer that derives your private key through encryption. Your private key is the cryptographic foundation controlling wallet access and asset ownership. Passphrase protects the private key generation process, ensuring secure key management in Pi Wallet.

* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.

Share

Content

Introduction: Safeguarding Your Pi Network Experience

What is the Pi Network Passphrase?

Historical Context and Industry Standards

How to Generate and Safeguard Your Pi Network Passphrase

Practical Example: Backing Up Your Pi Network Passphrase

Additional Security Tips and Notes

Final Thoughts: Making Security a Habit

FAQ

Related Articles
Enhancing Network Security Through Cryptographic Protocols

Enhancing Network Security Through Cryptographic Protocols

Enhancing Network Security Through Cryptographic Protocols delves into the pivotal role of cryptography in safeguarding digital communications. The article explores the evolution of cryptographic techniques from ancient ciphers to modern algorithms, detailing core concepts such as encryption, decryption, and key management. It addresses how cryptography ensures data confidentiality, integrity, and authentication, essential for online transactions and secure network communications. Targeted at tech professionals and cybersecurity enthusiasts, the piece outlines symmetric and asymmetric encryption methods and their applications, including digital currencies and smart contracts. Keywords like cryptographic protocols, network security, and encryption enhance readability and facilitate rapid understanding.
2025-12-04 07:16:21
Exploring Web3 in Depth: A Must-Have Beginner’s Guide

Exploring Web3 in Depth: A Must-Have Beginner’s Guide

Dive deep into the Web3 ecosystem with Web3 Academy. Our all-in-one starter guide equips newcomers with essential knowledge on decentralized wallet operations, token trading and swaps, Web3 versus traditional payment systems, and multi-chain asset management, empowering you to start your crypto journey confidently.
2025-11-23 08:15:38
How to Use Blockchain Explorers: Methods and Best Practices

How to Use Blockchain Explorers: Methods and Best Practices

Discover how to use blockchain explorers effectively, including tips for searching transaction data. This guide is designed for beginners, investors, and developers, covering essential features such as transaction queries, address lookups, block information, and smart contract validation. By mastering blockchain explorers, you’ll enhance your engagement with the blockchain ecosystem.
2025-12-21 04:04:35
How to Transfer a Cryptocurrency Wallet

How to Transfer a Cryptocurrency Wallet

A step-by-step guide to securely transferring your crypto asset wallet to a new device. This guide provides a detailed overview of effective backup and recovery methods, including the use of mnemonic phrases and cloud storage. It highlights essential tips to help both beginners and intermediate users migrate their wallets with confidence.
2025-11-25 09:55:57
Understanding Wallet Addresses: A Guide to Crypto Transactions

Understanding Wallet Addresses: A Guide to Crypto Transactions

This article provides an in-depth guide to understanding wallet addresses, vital components in cryptocurrency transactions, emphasizing their functionality and security implications. It addresses the types of wallet addresses, including those from centralized exchanges like Gate and self-custodial wallets, highlighting methods to obtain them. Readers will benefit from insights into preventing loss of funds, choosing a wallet based on their needs for control and security, and optimizing the management of their digital assets. Whether for beginner or advanced users, this article ensures an informed approach to cryptocurrency participation.
2025-12-19 06:00:04
Understanding Digital Asset Wallet Addresses: A Beginner's Guide

Understanding Digital Asset Wallet Addresses: A Beginner's Guide

This article serves as a beginner's guide to understanding digital asset wallet addresses, explaining their role in the cryptocurrency ecosystem. It details how these unique identifiers help securely transfer digital assets across blockchain networks, clarifies their cryptographic foundation, and distinguishes between public addresses and private keys. The guide also explores various methods for obtaining and using wallet addresses through platforms like Gate, self-custodial hot wallets, and hardware wallets. Designed for newcomers, it addresses key questions and provides insights into safe cryptocurrency management within the evolving Web3 environment.
2025-12-20 00:51:15
Recommended for You
What are derivatives market signals and how do futures open interest, funding rates, and liquidation data predict crypto price movements

What are derivatives market signals and how do futures open interest, funding rates, and liquidation data predict crypto price movements

This article explores how derivatives market signals—specifically futures open interest, funding rates, and liquidation data—serve as powerful predictors of cryptocurrency price movements. The guide addresses traders seeking to understand market sentiment through leverage positioning and trader conviction levels. It examines how rising open interest paired with positive funding rates signals bullish accumulation, while liquidation cascades reveal reversal risks. The analysis covers long-short ratio imbalances as early warning indicators and demonstrates how extreme funding rate spikes coincide with critical price inflection points. Using Gate and other platform data, traders can monitor these derivatives metrics to anticipate major price swings. The comprehensive framework combines multiple indicators to identify market tops, bottoms, and turning points, enabling more informed trading decisions in volatile crypto markets.
2026-01-21 03:53:13
How to Use Technical Indicators MACD, RSI, and Bollinger Bands for Crypto Trading Signals

How to Use Technical Indicators MACD, RSI, and Bollinger Bands for Crypto Trading Signals

This comprehensive guide explores three essential technical indicators—MACD, RSI, and Bollinger Bands—for identifying precise crypto trading entry and exit points on platforms like Gate. The article demonstrates how these indicators work synergistically to decode market momentum, overbought/oversold conditions, and volatility trends, while introducing additional tools like Golden Cross/Death Cross patterns and volume-price divergence analysis for enhanced signal confirmation. Designed for crypto traders seeking to reduce false signals and improve decision-making accuracy, the guide provides practical parameter settings across different timeframes, real-world application examples, and strategies for combining multiple indicators into a robust trading framework that navigates volatile crypto markets effectively.
2026-01-21 03:51:40
How to Measure Crypto Community Activity and Ecosystem Engagement in 2026

How to Measure Crypto Community Activity and Ecosystem Engagement in 2026

This comprehensive guide presents methods to measure crypto community activity and ecosystem engagement in 2026. Covering four core measurement dimensions: social media presence tracking on Twitter and Telegram as health indicators, community engagement metrics through interaction frequency and sentiment analysis, developer activity via GitHub commits demonstrating long-term viability, and DApp ecosystem scale through active user analysis and transaction volume. The article equips stakeholders with quantifiable frameworks to distinguish genuine community participation from bot activity, evaluate project sustainability, and assess protocol adoption rates across blockchain networks. Integrated metrics across multiple channels provide reliable indicators of authentic ecosystem health, helping investors and participants identify projects with sustained technical progress and committed community bases actively driving blockchain innovation and sustainable growth.
2026-01-21 03:50:07
What is crypto holdings and fund flows: exchange inflows, concentration, staking rates, and on-chain locked value

What is crypto holdings and fund flows: exchange inflows, concentration, staking rates, and on-chain locked value

This comprehensive guide examines four essential on-chain metrics for analyzing cryptocurrency market dynamics and investor behavior. Exchange inflows and outflows reveal capital movement patterns across trading platforms, signaling market sentiment and potential price action. Holding concentration metrics expose wealth distribution and institutional accumulation trends that impact asset volatility and network decentralization. Staking rates and Total Value Locked (TVL) demonstrate genuine investor commitment and ecosystem health within blockchain networks, with Merlin Chain achieving over 3.5 billion TVL post-mainnet launch. By integrating these metrics—tracking fund flows on Gate, analyzing concentration patterns, measuring locked value, and monitoring participation levels—market participants can distinguish between speculative fluctuations and sustainable adoption, enabling more informed investment decisions and accurate market cycle identification.
2026-01-21 03:46:34
What is community and ecosystem activity in cryptocurrency and how to measure it

What is community and ecosystem activity in cryptocurrency and how to measure it

This comprehensive guide explores cryptocurrency community and ecosystem activity—critical indicators of project health beyond price metrics. The article examines four core measurement dimensions: social media engagement through Twitter and Telegram tracking community growth and sentiment; developer ecosystem activity via GitHub commits and active contributors assessing technical momentum; DApp adoption metrics analyzing application quantity and daily active users; and community interaction frequency measuring discussion volume and holder loyalty. By systematically evaluating these metrics across platforms like Gate, stakeholders gain authentic insights into ecosystem maturity, adoption sustainability, and long-term viability. Understanding these measurement frameworks enables investors and developers to distinguish genuine ecosystem development from temporary market hype, ensuring informed decision-making in cryptocurrency ecosystems.
2026-01-21 03:44:52
What is tokenomics and how do token allocation, inflation mechanisms, and governance rights affect crypto value

What is tokenomics and how do token allocation, inflation mechanisms, and governance rights affect crypto value

This comprehensive guide explores tokenomics fundamentals and their critical impact on cryptocurrency valuation and sustainability. It examines four essential pillars: balanced token allocation across teams, investors, and communities that ensures long-term value stability; inflation and deflation mechanisms that control supply dynamics and price trajectories; token burn mechanisms that counteract inflationary pressure and maintain scarcity; and governance rights that empower token holders with decision-making authority. Using NEAR Protocol as a practical example, the article demonstrates how thoughtful tokenomics design prevents market volatility, aligns stakeholder incentives, and builds resilient ecosystems. Readers will understand how supply mechanics, vesting schedules, and community participation collectively determine whether cryptocurrency projects achieve sustainable value appreciation and genuine utility beyond speculation.
2026-01-21 03:43:14