Are you looking to trace crypto transactions or investigate a scam?
Our service uncovers transaction patterns and fund movements across bridges, swaps, and some mixers. I specialize in on-chain analysis to track transactions across Ethereum, BSC, Base, Arbitrum, and other EVM-compatible networks, as well as non-compatible networks such as Bitcoin, Solana, Stellar, and others.
Ideal for individuals, DeFi projects, and businesses needing reliable, evidence-based blockchain investigations in the form of a detailed report. Whether you're tracing suspicious activity or investigating an exploit, I deliver the clarity you need with precision.
Whether you need a basic service such as tracing a transaction, checking logs, tracking swaps, or small bridges, a mid-level investigation including the basic steps + Tornado Cash analysi, or full forensic support involving multi-chain analysis, obfuscation, and atomic swaps, we've got you covered.
I hold a BSc in Computer Science, am a Smart Contracts developer, and am prepared to provide professional blockchain forensic investigations tailored for DeFi investors, exploit victims, and compliance teams. You will receive a detailed report with visual flow maps, decoded logs, screenshots, links proving wallet interactions, and key insights to help you understand and mitigate incidents.
🔐 • To ensure the integrity and transparency of our work, and to provide greater security for your hiring, you can contact us through the Fiverr platform.
Founders must understand that analyzing internal activities and movement patterns in DeFi projects to identify behaviors that could compromise the integrity of the ecosystem is essential to anticipate risks, especially those related to fund misappropriation or governance abuse by insiders.
For example, without continuous monitoring of all addresses connected to your DeFi projects, internal fund diversions or unauthorized transfers can go unnoticed until it’s too late. Proactive analysis helps detect anomalies early, protecting both investors and reputation.
Recently, we encountered a case where a developer hired for a small DeFi project, with unrestricted access to the keys and backend of the dApp, siphoned funds and ended up transferring tokens to external wallets without authorization. The project owner only realized the theft weeks later.
We analyzed the token contract address and all its related transactions and wallets, mapped the flow of stolen funds, identified the final destinations, and gathered solid on-chain evidence that confirmed the internal breach. We also flagged high-risk interactions and cross-referenced activity patterns with other addresses, helping the project owner take appropriate action.
To mitigate risks, work rigorously with detailed pattern analysis and real-time transaction monitoring. Relying on professionals or specialized firms in on-chain tracking can help protect your investments, your project’s reputation, and ensure everything remains under control.
The security of any wallet depends solely and exclusively on you
For those who are not familiar yet, here are some of the most common types of attacks against wallets and how they drain your wallet, corrupt your funds, and steal your money. You probably ask yourself: "How can they do this? I did everything right," and start thinking you're not smart or clever enough, that DeFi is a scam, or that this type of investment isn't for you, and here is the answer:
In fact, keeping your wallet safe is much simpler than you might think. You just need to avoid any of these methods being used against you, and you will have infinitely more chances of staying safe using any self-custody wallet, such as Metamask, Trust Wallet, or Phantom. All wallets basically use the same standard (based on BIP-39 for seed phrase generation), and as a professional Blockchain Security Analyst and Forensic Investigator, I can say that in more than 90% of exploitation cases, it is the human factor that makes the attack possible.
The most common is through your SEED PHRASE
Many people usually interact with tokens just because an influencer or YouTuber is promoting them or someone shared a malicious site disguised as an investment or airdrop in a group. Once you access the site, it asks you to type your seed phrase, and you simply type it in without knowing it’s a scam. You should never enter your seed phrase on any website, this is never necessary. The only procedure needed to interact with Dapps is to connect your wallet.
Your seed phrase is only used to access your wallet on a device you haven’t used before. Once you have created your wallet and written down your 12 words on a piece of paper, the only operations you should normally perform are transfers and granting permissions to trusted contracts, not to just any random token or airdrop contract.
Another one is the Approval Exploit
Granting permissions is also a risk, and this brings us to another common type of exploit, the "malicious approval attack". When you access unknown websites, click on Telegram, Reddit, Twitter links, ads, emails, and visit platforms offering tokens or services you are not familiar with. Many of these approaches may be compromised, and when you connect your wallet and sign permissions, you allow scammers to steal your money.
Scammers often use malicious token standards or contracts configured to drain your wallet through the approval of spending permissions. Others may exploit transaction logic (such as fake swaps), draining funds through abusive transaction fees. This confuses you, because trusted smart contracts also ask for permission to use your money, but they do not steal from you, they manage it in the correct way.
Want to avoid this headache and loss?
Stay away from "magic money," suspicious airdrops, donation schemes, and investments promising high fixed returns (1%, 2%, 3% per day, 30% per month, etc...). Study the protocol, the team, verify if the project really exists and if you are on the correct website. There are phishing attempts on sites like Etherscan (fake "Permit Activated"), on Solscan, on crypto news websites, and especially in Google search results.
Where to find the correct link?
Check the company’s official page on X (Twitter) or LinkedIn. Get the official link directly from the company’s verified page on social media. Do not type your seed phrase, do not store it on your computer in screenshots, text files, or emails. Do not grant permissions to sites you are not completely sure or familiar with.
Regardless of which wallet you use, if you do not pay attention to these details, your funds will be compromised.
All it takes is opening an EVM-based explorer and checking where the money went. However, depending on the depth of analysis you need, you’ll start encountering odd values, seemingly meaningless dispersions, interactions with smart contracts and protocols you’ve never even heard of, let alone understand their actual purpose.
That’s where we come in, to decipher this tangled web of hashes, values, timestamps... and organize it into a clear and understandable format for everyday investors or companies seeking precise and actionable insights.
We don’t just analyze the transaction flow, we also investigate potential links to illicit activities, such as fraudulent protocols, addresses flagged for phishing or scams, market manipulation, exploit abuse, and money laundering.
Want to learn more? Interested in how we work and our methodology? Schedule a consultation, send us a message or email, or visit our Notion page for more details.
Tornado Cash is a mixer that does not directly record the connection between addresses, using privacy techniques to hide the origin and destination of transactions. However, it records certain events that, when combined with other analyses and external information, can help identify patterns.
In other words, although transactions within Tornado Cash are designed to be private, by combining public blockchain data, deposit and withdrawal timings, and other related signals, it is possible to develop analytical patterns that help detect movement of funds exiting the mixer.
You might think: “But when I use Tornado Cash, the trail disappears I regret to disappoint, but with advances in blockchain technology and intelligence tools, these methods are no longer 100% effective. The blockchain is a public ledger and every interaction is recorded in its blocks. The secret is to deeply read this data, decode function parameters, use comparison algorithms, and then see the connection.
There may not be a direct link showing that A sent to B, but by analogy: if José has only two children, and Pedro is João’s brother and João is José’s son, then Pedro is probably José’s son as well. You might think again:“But that analysis doesn’t directly connect the addresses". If we look at only that data in isolation, no. However, by analyzing the transaction behavior of one address with other addresses, or a network of them, if at least one has KYC, combining history and other information, it is possible to conclude with evidence that an address belongs to a specific user.
Following the trail of on-chain funds seems simple… until the transaction crosses multiple protocols, passes through bridges, executes swaps on DEXs, CEXs, and still tries to obscure the origin using mixers.
Each step fragments the trail, tokens change form (wraps, unwraps, swaps), different chains enter the flow, timestamps lose synchronization, and the signals of intent get diluted among hundreds of automated transactions. What was once a clear movement… turns into a tangled web of hashes.
Our role is precisely to reconstruct these flows, to understand the behavior behind each transaction, identify patterns, and rebuild the path of the funds end to end, with context, chronology, and each step technically verifiable in an easy-to-understand report, even for non-technical people.
There is no magic tool that delivers everything ready-made. What makes this happen is the combination of manual analysis, custom scripts, contract reading, and understanding the behavior of those behind the transactions.
Did you know it's possible to trace transactions using block explorers to decode events, logs, input data, and wallet interactions?
This allows us to identify patterns and even recover your stolen Bitcoin, Ethereum, or any other token. With the help of authorities and centralized exchanges such as Binance, it's sometimes even possible to block the scammer's account and legally request the return of your assets.
🔐 • To ensure the transparency of our work, and to provide greater security for your hiring, you can contact us through Fiverr: https://www.fiverr.com/s/424VQry
M13 Digital
--
Are you looking to trace crypto transactions or investigate a scam?
Our service uncovers transaction patterns and fund movements across bridges, swaps, and some mixers. I specialize in on-chain analysis to track transactions across Ethereum, BSC, Base, Arbitrum, and other EVM-compatible networks, as well as non-compatible networks such as Bitcoin, Solana, Stellar, and others.
Ideal for individuals, DeFi projects, and businesses needing reliable, evidence-based blockchain investigations in the form of a detailed report. Whether you're tracing suspicious activity or investigating an exploit, I deliver the clarity you need with precision.
Whether you need a basic service such as tracing a transaction, checking logs, tracking swaps, or small bridges, a mid-level investigation including the basic steps + Tornado Cash analysi, or full forensic support involving multi-chain analysis, obfuscation, and atomic swaps, we've got you covered.
I hold a BSc in Computer Science, am a Smart Contracts developer, and am prepared to provide professional blockchain forensic investigations tailored for DeFi investors, exploit victims, and compliance teams. You will receive a detailed report with visual flow maps, decoded logs, screenshots, links proving wallet interactions, and key insights to help you understand and mitigate incidents.
🔐 • To ensure the integrity and transparency of our work, and to provide greater security for your hiring, you can contact us through the Fiverr platform.
If you are a micro or small business owner using blockchain for investments, operations, or an extremely active investor in the crypto market, even with years of experience, there is a sophisticated scam that could put you at risk.
🤔 • What is the poisoning scam ❓
Essentially, the scammer creates a wallet address that is very similar to one the victim frequently interacts with. For example, if your business or you, as an investor, regularly sends assets to the wallet 0xM13Digital…abc, the scammer, using sophisticated software sold on the dark web, can generate an address like 0xM13D181000…abc, with similar first and last characters but differences in the middle.
The exploiter then starts sending small transactions to your wallet, hoping that you, when copying the address or trusting your transaction history, will accidentally send funds to the scammer's address.
⚠️ • How to protect yourself from poisoning scam ❓
• Always verify the full address before sending a transaction, checking every character. Don’t rely solely on the first and last digits.
• Some wallets and exchanges allow you to maintain a secure list of addresses you regularly use. For businesses, set up processes that require double verification of addresses by different team members before large transfers.
• Use wallets with visual alerts, such as MetaMask or extensions such as Scam Sniffer, which allow you to configure notifications or display only previously saved addresses, reducing the risk of errors.
Situations where users lose large amounts, such as $50,00 or more, have become increasingly common. These losses may result from phishing scams, interactions with malicious smart contracts, or simple human error during a transaction.
The question that inevitably follows such a loss is: "Is it possible to recover?"
And the answer is: "Yes, there are possible paths for tracking—and, in some cases, recovery."
The first step is to preserve all records related to the incident:
• Transaction hashes • Wallet addresses involved • Platforms used (websites, exchanges, DApps) • Any screenshots that help build a timeline of events
The next step is to file a formal report with local authorities. This should be done through a police report that includes all technical details of the incident. It’s essential to identify the type of incident, as each category of loss requires a distinct approach. Each type of attack involves a specific skill level from the exploiter, and the method of fund evasion often follows accordingly.
The most common include:
• Fake websites, fake support, fake ads, and malicious links • Tokens or contracts with hidden permissions to drain funds • Exploits targeting vulnerabilities in smart contracts, such as known flaws or oracle manipulation • Mistakes like sending funds to the wrong wallet or falling for poisoning scams
Tools like Etherscan and similar blockchain explorers allow tracking the path of funds. More advanced software, or custom scripts created by investigators or developers specialized in this area, can be used to analyze wallet interactions through deeper on-chain data.
On the M13 Digital, we have documented investigations across a wide range of similar cases: scam tokens, rug pulls, market manipulation schemes, and even MEV bots that altered contract behavior to execute exploits. All of this is reported and archived with tracking links, timelines, detailed screenshots, and technical notes explaining the techniques and protocols used by attackers to obscure their actions.
• Its market cap plummeted from 5 billion to less than 1 million in a matter of hours, with over 90% of its value evaporating, leaving investors, including investment firms that believed in the project, high and dry.
MANTRA is a blockchain focused on the tokenization of real-world assets (RWA). Recently, on April 13, 2025, MANTRA faced a catastrophic event in the crypto market when the price of its token crashed dramatically, reaching losses of around 90% in a single day.
The MANTRA team came forward to explain to its investors, though, compared to Bybit’s response, they were slow to appear, which greatly frustrated the market. The CEO pointed to "reckless forced liquidations" carried out by centralized exchanges (CEXs) during a period of low liquidity, such as Sunday night in UTC.
According to the team, these liquidations were unrelated to internal project issues, such as hacks or actions by the team itself, like mass dumping, despite accusations that the team holds over 90% of the active supply in their wallets. They stated that the platform is operating normally and the project remains "fundamentally strong."
The lack of precise information has fueled speculation in the community. Some investors have raised hypotheses of potential security flaws or market manipulations, while others await more detailed clarifications. MANTRA reiterated its commitment to transparency and promised updates as the investigation progresses.
I didn’t read the whole HD case, but from what I saw in some sources, he stored the private key on the HD... very common back then, keeping the key in the wallet.dat file.
Hillbilie blue
--
Well , why not mention ,the guy who offered to pay $24M to let him dig up the dump site in Wales ? (for his hard drive)
A British woman accidentally threw away a USB drive containing around £3 million in Bitcoin, which belonged to her partner Tom, who had bought the crypto assets back in 2013. She confused the device with old school materials and discarded it without knowing its value. The couple tried to recover the USB drive from the trash but failed, and the loss had a major emotional and financial impact.
⚙️ • Why❓
First of all, the supposed USB drive would have to be a hardware wallet containing Bitcoin. However, a hardware wallet (or cold wallet) does not actually store any crypto assets directly. Hard wallets only store the cryptographic keys that allow you to access and move your assets.
That’s why a hard wallet is considered safer than an exchange. However, self-custody also comes with high risks. For example, if you lose your seed phrase (a set of 12 or 24 words), or leave it exposed on a computer, saved in a notepad, a screenshot, or written down on paper and then lose the paper, anyone could access and move your assets from any computer or device.
In other words, if the couple actually owned crypto assets, they wouldn’t need the “USB drive” to move the funds again. They would only need the seed phrase. Finally, the article was published by a website that’s filled with ads, and analyses have shown that the image of the supposed couple is 99% likely to have been AI-generated.
⚖️ • Conclusion:
This case brings us back to the story of a British engineer who, in 2013, threw away an HD containing the key to a wallet with 8,000 Bitcoins, bought in 2009, and now, in 2025 are valued at around $800 million. In the HD case, he stored the private key in a wallet.dat file, common at the time before the seed phrase (BIP-39) became popular, and obviously without a backup. This couple's case doesn’t even specify what was thrown away and leaves room for interpretations and increasing engagement.
Bubblemaps is a blockchain analytics platform that helps users understand complex on-chain data through interactive visualizations.
It organizes data into a simple bubble-based format, making it easier to see token distributions and connections between crypto wallets.
The goal of the platform is to make blockchain data more accessible and transparent for everyone.
Introduction
Bubblemaps is a tool that helps people understand blockchain data in a simple and visual way. Instead of looking at confusing numbers and long lists of transactions, it shows wallet connections using bubbles. This makes it easier to see who owns what and how tokens move around.
How Bubblemaps Works
Bubblemaps organizes blockchain data into interactive bubble charts. Each bubble represents a wallet, and the bigger the bubble, the more tokens it holds. If bubbles are connected, it means those wallets have transferred tokens between them. This helps users spot patterns, like groups of wallets that might be working together.
Source: app.bubblemaps.io
Bubblemaps V1
Let’s do a quick exploration of Bubblemaps V1 to illustrate its basic functionalities.
The first step is to search for a token or wallet address. In this example, we searched for BMT, which is Bubblemaps native token. The token is available on Solana and BSC blockchains.
By default, the visualization tool displays the top 150 holders of a token. Some bubbles that belong to contracts or exchanges are automatically hidden, but you can reveal them by clicking the eye button next to their address or name.
You can also reveal or hide multiple contracts and exchanges using the top Wallets List menu.
When a wallet is selected, you can click [Show transfers] to check the blockchain transactions related to that wallet.
Although not required to use the app, users can connect using their X accounts or Web3 crypto wallets, such as Trust Wallet, MetaMask, or Phantom.
Bubblemaps V2
Bubblemaps V2 is an upgraded version of the platform with better features for tracking token holders and blockchain transactions.
Source: wiki.bubblemaps.io
Some of the key features of V2 include:
Improved bubble charts: The bubble maps are more intuitive and feature new tools to improve your analysis.
Time Travel: Historical analysis that shows changes in token distribution over time, helping track potentially significant movements in the market.
Magic Nodes: Uses artificial intelligence to uncover hidden links between wallets, which can be useful for fraud detection.
Filtering and customization: Users can filter data based on token type, transaction amount, and other parameters.
More frequent updates: The platform refreshes data every six hours to provide the latest insights.
Cross-chain: Bubblemaps V2 works with multiple blockchains, including Ethereum, Solana, Polygon, Avalanche, and BNB Chain.
Bubblemaps V2 got more than 200,000 accounts in 3 days, so the team decided to limit its access temporarily to the team, partners, and early adopters. Access is being provided gradually to users who signed up for the beta test. New users can still join the Beta Waitlist through Bubblemaps website.
Is Bubblemaps free to use?
As of March 2025, the Bubblemaps platform is free to use. The V2 also includes free features like Magic Nodes, Time Travel, and real-time data.
However, some advanced features are accessible only to BMT token holders. Such features include profit and loss computation, cross-chain analytics, AI models to interpret clusters, and Bubble Maps with the top 1,000 holders.
Bubblemaps also offers a premium subscription for unlimited access to DeFi tokens and blockchain data. However, the service is currently limited to eligible users who were approved before the token migration of March 10, 2025.
The Intel Desk
Intel Desk is a platform created to encourage community-led on-chain investigations. It operates as a decentralized, token-based system where users stake BMT to vote on which investigations should be prioritized. The goal of Intel Desk is to make blockchain analysis more democratic.
Source: wiki.bubblemaps.io
The BMT Token
BMT is the token that powers Bubblemaps. It’s used for governance (voting on investigations), rewards, and unlocking extra platform features.
Tokenomics
Total Supply: 1,000,000,000 BMT
Circulating supply at launch: 261,568,133 BMT (26.15% of total supply)
Blockchain networks: BMT exists on Solana and BNB Smart Chain, using LayerZero's Omnichain Fungible Token (OFT) standard.
Allocation
Ecosystem Fund (21.3%): Used for Intel Desk incentives, platform adoption rewards, and ecosystem grants.
Airdrops (22.17%): Distributed to early adopters and community supporters.
Investors (19.35%): Allocated to private and strategic investors.
Liquidity (12.18%): Used to provide stability in exchanges.
Team (9%): Reserved for developers and contributors.
Research and Development (6%): Funds future improvements.
Binance Wallet IDO (4%): Supports the initial token launch.
Binance HODLer Airdrop (3%): Rewards Binance users who stake BNB.
Binance Marketing (3%): Promotes adoption through campaigns.
BMT on Binance HODLer Airdrops
On March 18, 2025, Binance announced Bubblemaps (BMT) as the 12th project on the Binance HODLer Airdrops program. Users who subscribed their BNB to Simple Earn or On-Chain Yields products during the eligibility period qualified for BMT rewards. A total of 30 million BMT were allocated to the program.
After the airdrop, BMT was listed on Binance with the Seed Tag applied, allowing for trading against the USDT, USDC, BNB, FDUSD, and TRY pairs.
Closing Thoughts
Bubblemaps is a unique tool that turns complicated blockchain data into easy-to-read visuals. With features like bubble charts, historical tracking, and AI-powered wallet analysis, it helps users detect trends and understand token movements. The Intel Desk and BMT token add a community-driven aspect, letting users participate in investigations and governance.
Further Reading
How to Set Up a Crypto Wallet
Your Guide to Binance Launchpad and Launchpool
What Is the Binance Airdrop Portal?
This article is for educational purposes only. This content is presented to you on an “as is” basis for general information and educational purposes only, without representation or warranty of any kind. It should not be construed as financial, legal or other professional advice, nor is it intended to recommend the purchase of any specific product or service. You should seek your own advice from appropriate professional advisors. Products mentioned in this article may not be available in your region. Where the article is contributed by a third party contributor, please note that those views expressed belong to the third party contributor, and do not necessarily reflect those of Binance Academy. Please read our full disclaimer for further details. Digital asset prices can be volatile. The value of your investment may go down or up and you may not get back the amount invested. You are solely responsible for your investment decisions and Binance Academy is not liable for any losses you may incur. This material should not be construed as financial, legal or other professional advice. For more information, see our Terms of Use and Risk Warning.
A hard or cold wallet is a physical device used to store your private keys offline. Unlike online wallets (such as Phantom, Exodus, Metamask, or any other), it is not constantly connected to the internet, significantly reducing the risk of cyberattacks.
☠️ • Note:
Remember that no wallet actually stores cryptocurrencies; they only store private keys, which allow you to move your assets. This is what hackers target, they try to steal your private keys or trick you into using them online to grant them control over your funds.
❓ • How so?
Hackers use various methods, such as:
• Sending malicious tokens designed to trick you into authorizing spending through their contract token.
• Making you download software that scans your personal files for saved passwords in text documents or screenshots.
• Deploying tokens with malicious contract functions that block trading and drain your funds when you attempt to trade them.
⚙️ • How does a hard wallet work?
A hard wallet stores private keys off-line. To make a transaction, the user connects the wallet to a device (via USB), manually signs the transaction by pressing a button on the physical device while offline, and then the device transmits the signed transaction to the blockchain, without exposing the private key to the internet. In addition, the device requires a PIN (an alphanumeric password of your choice) to authorize transactions. Both the software and hardware are designed with specific, tamper-proof security technologies.
🛍️ • Which one should I buy ❓
Reliable examples of hard/cold wallets include Ledger and Trezor. There are other devices available, but it's up to the user to explore and choose their preferred option.
Yeah...the amount of ETH stored in this type of protocol is always large. 🔥
EyeOnChain
--
Bullish
HACKERS’ FAVORITE CURRENCY? IT'S $ETH AGAIN. The notorious Zoth hacker has made their move. Just 17 hours ago, the attacker swapped stolen funds worth $8.32M for 4,223 #ETH at an average price of $1,968. The wallet address involved is 0x7b0cd0d83565adbb57585d0265b7d15d6d9f60cf. Zoth, a DeFi protocol focused on real-world assets (RWAs), was hacked for approximately $8.85M. After the heist, the hacker swapped the funds for 8.32M DAI and later converted it all to ETH. Interestingly, the hacker’s wallet was funded with 0.546 ETH from ChangeNow just 7 days ago. This incident once again highlights how ETH remains the top choice for #hackers looking to cover their tracks.
⛓️🕵🏻♂️🐾 I will track this movement and report back on it soon. Let's see what we can learn from this case. $ETH $SOL
EyeOnChain
--
Bullish
HACKERS’ FAVORITE CURRENCY? IT'S $ETH AGAIN. The notorious Zoth hacker has made their move. Just 17 hours ago, the attacker swapped stolen funds worth $8.32M for 4,223 #ETH at an average price of $1,968. The wallet address involved is 0x7b0cd0d83565adbb57585d0265b7d15d6d9f60cf. Zoth, a DeFi protocol focused on real-world assets (RWAs), was hacked for approximately $8.85M. After the heist, the hacker swapped the funds for 8.32M DAI and later converted it all to ETH. Interestingly, the hacker’s wallet was funded with 0.546 ETH from ChangeNow just 7 days ago. This incident once again highlights how ETH remains the top choice for #hackers looking to cover their tracks.