Forgotten Wallet.dat Password: 13.8 BTC Inaccessible Since 2013
IndeterminateWallet passphrase was unavailable — whether access was ultimately recovered is not known.
In September 2019, a BitcoinTalk forum user identified as lankymanx disclosed loss of access to a wallet.dat file created in 2013, containing 13.8 BTC. The wallet used Bitcoin Core's native encryption feature, which protects private keys with a user-set password. The user had forgotten this password and sought technical recovery assistance from the community.
Lankymanx believed the password used a specific character set (mixed case letters, numbers, and symbols including @#%) and possessed approximate length information. Community members provided detailed guidance on using btcrecover, an open-source Python tool designed for brute-force password recovery on encrypted Bitcoin wallets. The user encountered configuration difficulties with regex patterns and token file syntax.
Multiple respondents estimated recovery feasibility: a 6-character password might crack in minutes to hours on modern hardware; longer passwords would extend timelines significantly. The thread introduced walletrecoveryservices.com as a professional alternative, charging 20% of recovered funds as fee.
In December 2019, another user (UAE Seasider) posted a testimonial confirming successful recovery of a similar 12.5 BTC wallet through the same professional service after 3 weeks of computational effort. However, lankymanx's original post contains no confirmation of final recovery outcome.
Blockchain analysis by forum user 'Dabs' in November 2019 revealed that coins at the associated address had not moved, indicating the wallet remained inaccessible at that timestamp. The incident illustrates the custody risk inherent in single-factor password protection of locally-stored encrypted files without backup seeds, recovery passphrases, or documented access procedures.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Indeterminate |
| Documentation | Partial |
| Year observed | 2019 |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.