Wallet Forensics
Investigate wallet security: trace fund flows, detect dusting attacks, analyze approvals, and score counterparty risk.
Dusting Detection
Identify micro-value transfers, spam tokens, and address poisoning attacks with pattern analysis.
Fund Flow Tracing
Trace fund movements through multiple hops with taint propagation and mixer/bridge detection.
Security Timeline
Chronological view of approvals, large transfers, mixer interactions, and anomalous activity.
Counterparty Analysis
Risk-scored counterparty profiles with entity labeling, interaction patterns, and transitive risk.
Sign in to access Wallet Forensics
Use the Sign In button in the navigation bar.