Back to Tornado Cash Wiki
Tornado Cash logo

Lost note guide

Step-by-step triage before calling recovery impossible.

Phase A: Lock ground truth

If these are wrong, every downstream recovery attempt can fail for the wrong reason.

Phase B: Build an artifact map

Phase C: Execute path-aware recovery

  1. Run one path at a time and keep outputs separated.
  2. Do not merge all notes before interpretation.
  3. Treat failed decryptions as diagnostic signal, not instant dead-end.
  4. If results are empty, re-check assumptions before widening scan scope.

Worksheet: what to write down before scanning

Field Why it matters
Network Wrong network produces systematic empty results.
Denomination Pool denomination determines which event set matters.
Deposit window Narrows candidate commitments and reduces false assumptions.
Available artifacts Determines whether recovery is realistic or only speculative.

Phase D: Security red lines

When to pause and re-check assumptions

Good recovery is conservative. Do not keep widening scope blindly when the base facts are shaky.

Guided workflow option

If manual scripting is not practical, some users test:

@TornadoNoteRecoveryBot

Related: tornado-note-recovery