Our Investigation Process
A structured, professional methodology based on established digital forensics standards used by financial regulators and law enforcement worldwide.
Evidence Collection & Case Setup
Client submits wallet addresses, transaction IDs, and supporting evidence. Our intake team verifies the information and creates a secure case file. A dedicated investigator is assigned within 24 hours.
Blockchain Transaction Tracing
We trace the full transaction path from the victim's wallet across multiple hops. Using UTXO analysis (for BTC) and event log tracing (for ETH/EVM chains), we identify every intermediary wallet in the chain.
Wallet Clustering & Pattern Analysis
Related wallets are grouped into clusters based on common-input heuristics, transaction timing patterns, and address reuse. This reveals the true scale of scam operations and links wallets to known entities.
Exchange & Service Identification
When funds reach a centralized exchange or known service, we identify the entity using on-chain signatures, known deposit address patterns, and our proprietary exchange address database (covering 200+ platforms).
AI Risk Scoring & Pattern Detection
Our machine learning engine analyzes 14 behavioral signals across the identified wallets: transaction frequency, dormancy, dispersion patterns, scam database matches, and more. Each wallet receives a calibrated risk score.
Evidence Documentation & Report Creation
Findings are compiled into a professional forensic investigation report including: blockchain trace diagrams, wallet cluster maps, risk assessments, exchange identification, and recommended next steps for law enforcement or exchange reporting.
Law Enforcement & Exchange Guidance
Where identifiable exchanges are involved, we assist with formal cooperation requests. We guide clients on submitting evidence to the appropriate cybercrime units, financial regulators, and international agencies (FBI IC3, Action Fraud, Europol EC3).