Are you looking to trace crypto transactions or investigate a scam?
Our service uncovers transaction patterns and fund movements across bridges, swaps, and some mixers. I specialize in on-chain analysis to track transactions across Ethereum, BSC, Base, Arbitrum, and other EVM-compatible networks, as well as non-compatible networks such as Bitcoin, Solana, Stellar, and others.
Ideal for individuals, DeFi projects, and businesses needing reliable, evidence-based blockchain investigations in the form of a detailed report. Whether you're tracing suspicious activity or investigating an exploit, I deliver the clarity you need with precision.
Whether you need a basic service such as tracing a transaction, checking logs, tracking swaps, or small bridges, a mid-level investigation including the basic steps + Tornado Cash analysi, or full forensic support involving multi-chain analysis, obfuscation, and atomic swaps, we've got you covered.
I hold a BSc in Computer Science, am a Smart Contracts developer, and am prepared to provide professional blockchain forensic investigations tailored for DeFi investors, exploit victims, and compliance teams. You will receive a detailed report with visual flow maps, decoded logs, screenshots, links proving wallet interactions, and key insights to help you understand and mitigate incidents.
🔐 • To ensure the integrity and transparency of our work, and to provide greater security for your hiring, you can contact us through the Fiverr platform.
🔐 • To ensure the transparency of our work, and to provide greater security for your hiring, you can contact us through Fiverr: https://www.fiverr.com/s/424VQry
M13 Digital
--
Are you looking to trace crypto transactions or investigate a scam?
Our service uncovers transaction patterns and fund movements across bridges, swaps, and some mixers. I specialize in on-chain analysis to track transactions across Ethereum, BSC, Base, Arbitrum, and other EVM-compatible networks, as well as non-compatible networks such as Bitcoin, Solana, Stellar, and others.
Ideal for individuals, DeFi projects, and businesses needing reliable, evidence-based blockchain investigations in the form of a detailed report. Whether you're tracing suspicious activity or investigating an exploit, I deliver the clarity you need with precision.
Whether you need a basic service such as tracing a transaction, checking logs, tracking swaps, or small bridges, a mid-level investigation including the basic steps + Tornado Cash analysi, or full forensic support involving multi-chain analysis, obfuscation, and atomic swaps, we've got you covered.
I hold a BSc in Computer Science, am a Smart Contracts developer, and am prepared to provide professional blockchain forensic investigations tailored for DeFi investors, exploit victims, and compliance teams. You will receive a detailed report with visual flow maps, decoded logs, screenshots, links proving wallet interactions, and key insights to help you understand and mitigate incidents.
🔐 • To ensure the integrity and transparency of our work, and to provide greater security for your hiring, you can contact us through the Fiverr platform.
If you are a micro or small business owner using blockchain for investments, operations, or an extremely active investor in the crypto market, even with years of experience, there is a sophisticated scam that could put you at risk.
🤔 • What is the poisoning scam ❓
Essentially, the scammer creates a wallet address that is very similar to one the victim frequently interacts with. For example, if your business or you, as an investor, regularly sends assets to the wallet 0xM13Digital…abc, the scammer, using sophisticated software sold on the dark web, can generate an address like 0xM13D181000…abc, with similar first and last characters but differences in the middle.
The exploiter then starts sending small transactions to your wallet, hoping that you, when copying the address or trusting your transaction history, will accidentally send funds to the scammer's address.
⚠️ • How to protect yourself from poisoning scam ❓
• Always verify the full address before sending a transaction, checking every character. Don’t rely solely on the first and last digits.
• Some wallets and exchanges allow you to maintain a secure list of addresses you regularly use. For businesses, set up processes that require double verification of addresses by different team members before large transfers.
• Use wallets with visual alerts, such as MetaMask or extensions such as Scam Sniffer, which allow you to configure notifications or display only previously saved addresses, reducing the risk of errors.
Situations where users lose large amounts, such as $50,00 or more, have become increasingly common. These losses may result from phishing scams, interactions with malicious smart contracts, or simple human error during a transaction.
The question that inevitably follows such a loss is: "Is it possible to recover?"
And the answer is: "Yes, there are possible paths for tracking—and, in some cases, recovery."
The first step is to preserve all records related to the incident:
• Transaction hashes • Wallet addresses involved • Platforms used (websites, exchanges, DApps) • Any screenshots that help build a timeline of events
The next step is to file a formal report with local authorities. This should be done through a police report that includes all technical details of the incident. It’s essential to identify the type of incident, as each category of loss requires a distinct approach. Each type of attack involves a specific skill level from the exploiter, and the method of fund evasion often follows accordingly.
The most common include:
• Fake websites, fake support, fake ads, and malicious links • Tokens or contracts with hidden permissions to drain funds • Exploits targeting vulnerabilities in smart contracts, such as known flaws or oracle manipulation • Mistakes like sending funds to the wrong wallet or falling for poisoning scams
Tools like Etherscan and similar blockchain explorers allow tracking the path of funds. More advanced software, or custom scripts created by investigators or developers specialized in this area, can be used to analyze wallet interactions through deeper on-chain data.
On the M13 Digital, we have documented investigations across a wide range of similar cases: scam tokens, rug pulls, market manipulation schemes, and even MEV bots that altered contract behavior to execute exploits. All of this is reported and archived with tracking links, timelines, detailed screenshots, and technical notes explaining the techniques and protocols used by attackers to obscure their actions.
• Its market cap plummeted from 5 billion to less than 1 million in a matter of hours, with over 90% of its value evaporating, leaving investors, including investment firms that believed in the project, high and dry.
MANTRA is a blockchain focused on the tokenization of real-world assets (RWA). Recently, on April 13, 2025, MANTRA faced a catastrophic event in the crypto market when the price of its token crashed dramatically, reaching losses of around 90% in a single day.
The MANTRA team came forward to explain to its investors, though, compared to Bybit’s response, they were slow to appear, which greatly frustrated the market. The CEO pointed to "reckless forced liquidations" carried out by centralized exchanges (CEXs) during a period of low liquidity, such as Sunday night in UTC.
According to the team, these liquidations were unrelated to internal project issues, such as hacks or actions by the team itself, like mass dumping, despite accusations that the team holds over 90% of the active supply in their wallets. They stated that the platform is operating normally and the project remains "fundamentally strong."
The lack of precise information has fueled speculation in the community. Some investors have raised hypotheses of potential security flaws or market manipulations, while others await more detailed clarifications. MANTRA reiterated its commitment to transparency and promised updates as the investigation progresses.
I didn’t read the whole HD case, but from what I saw in some sources, he stored the private key on the HD... very common back then, keeping the key in the wallet.dat file.
Hillbilie blue
--
Well , why not mention ,the guy who offered to pay $24M to let him dig up the dump site in Wales ? (for his hard drive)
A British woman accidentally threw away a USB drive containing around £3 million in Bitcoin, which belonged to her partner Tom, who had bought the crypto assets back in 2013. She confused the device with old school materials and discarded it without knowing its value. The couple tried to recover the USB drive from the trash but failed, and the loss had a major emotional and financial impact.
⚙️ • Why❓
First of all, the supposed USB drive would have to be a hardware wallet containing Bitcoin. However, a hardware wallet (or cold wallet) does not actually store any crypto assets directly. Hard wallets only store the cryptographic keys that allow you to access and move your assets.
That’s why a hard wallet is considered safer than an exchange. However, self-custody also comes with high risks. For example, if you lose your seed phrase (a set of 12 or 24 words), or leave it exposed on a computer, saved in a notepad, a screenshot, or written down on paper and then lose the paper, anyone could access and move your assets from any computer or device.
In other words, if the couple actually owned crypto assets, they wouldn’t need the “USB drive” to move the funds again. They would only need the seed phrase. Finally, the article was published by a website that’s filled with ads, and analyses have shown that the image of the supposed couple is 99% likely to have been AI-generated.
⚖️ • Conclusion:
This case brings us back to the story of a British engineer who, in 2013, threw away an HD containing the key to a wallet with 8,000 Bitcoins, bought in 2009, and now, in 2025 are valued at around $800 million. In the HD case, he stored the private key in a wallet.dat file, common at the time before the seed phrase (BIP-39) became popular, and obviously without a backup. This couple's case doesn’t even specify what was thrown away and leaves room for interpretations and increasing engagement.
Bubblemaps is a blockchain analytics platform that helps users understand complex on-chain data through interactive visualizations.
It organizes data into a simple bubble-based format, making it easier to see token distributions and connections between crypto wallets.
The goal of the platform is to make blockchain data more accessible and transparent for everyone.
Introduction
Bubblemaps is a tool that helps people understand blockchain data in a simple and visual way. Instead of looking at confusing numbers and long lists of transactions, it shows wallet connections using bubbles. This makes it easier to see who owns what and how tokens move around.
How Bubblemaps Works
Bubblemaps organizes blockchain data into interactive bubble charts. Each bubble represents a wallet, and the bigger the bubble, the more tokens it holds. If bubbles are connected, it means those wallets have transferred tokens between them. This helps users spot patterns, like groups of wallets that might be working together.
Source: app.bubblemaps.io
Bubblemaps V1
Let’s do a quick exploration of Bubblemaps V1 to illustrate its basic functionalities.
The first step is to search for a token or wallet address. In this example, we searched for BMT, which is Bubblemaps native token. The token is available on Solana and BSC blockchains.
By default, the visualization tool displays the top 150 holders of a token. Some bubbles that belong to contracts or exchanges are automatically hidden, but you can reveal them by clicking the eye button next to their address or name.
You can also reveal or hide multiple contracts and exchanges using the top Wallets List menu.
When a wallet is selected, you can click [Show transfers] to check the blockchain transactions related to that wallet.
Although not required to use the app, users can connect using their X accounts or Web3 crypto wallets, such as Trust Wallet, MetaMask, or Phantom.
Bubblemaps V2
Bubblemaps V2 is an upgraded version of the platform with better features for tracking token holders and blockchain transactions.
Source: wiki.bubblemaps.io
Some of the key features of V2 include:
Improved bubble charts: The bubble maps are more intuitive and feature new tools to improve your analysis.
Time Travel: Historical analysis that shows changes in token distribution over time, helping track potentially significant movements in the market.
Magic Nodes: Uses artificial intelligence to uncover hidden links between wallets, which can be useful for fraud detection.
Filtering and customization: Users can filter data based on token type, transaction amount, and other parameters.
More frequent updates: The platform refreshes data every six hours to provide the latest insights.
Cross-chain: Bubblemaps V2 works with multiple blockchains, including Ethereum, Solana, Polygon, Avalanche, and BNB Chain.
Bubblemaps V2 got more than 200,000 accounts in 3 days, so the team decided to limit its access temporarily to the team, partners, and early adopters. Access is being provided gradually to users who signed up for the beta test. New users can still join the Beta Waitlist through Bubblemaps website.
Is Bubblemaps free to use?
As of March 2025, the Bubblemaps platform is free to use. The V2 also includes free features like Magic Nodes, Time Travel, and real-time data.
However, some advanced features are accessible only to BMT token holders. Such features include profit and loss computation, cross-chain analytics, AI models to interpret clusters, and Bubble Maps with the top 1,000 holders.
Bubblemaps also offers a premium subscription for unlimited access to DeFi tokens and blockchain data. However, the service is currently limited to eligible users who were approved before the token migration of March 10, 2025.
The Intel Desk
Intel Desk is a platform created to encourage community-led on-chain investigations. It operates as a decentralized, token-based system where users stake BMT to vote on which investigations should be prioritized. The goal of Intel Desk is to make blockchain analysis more democratic.
Source: wiki.bubblemaps.io
The BMT Token
BMT is the token that powers Bubblemaps. It’s used for governance (voting on investigations), rewards, and unlocking extra platform features.
Tokenomics
Total Supply: 1,000,000,000 BMT
Circulating supply at launch: 261,568,133 BMT (26.15% of total supply)
Blockchain networks: BMT exists on Solana and BNB Smart Chain, using LayerZero's Omnichain Fungible Token (OFT) standard.
Allocation
Ecosystem Fund (21.3%): Used for Intel Desk incentives, platform adoption rewards, and ecosystem grants.
Airdrops (22.17%): Distributed to early adopters and community supporters.
Investors (19.35%): Allocated to private and strategic investors.
Liquidity (12.18%): Used to provide stability in exchanges.
Team (9%): Reserved for developers and contributors.
Research and Development (6%): Funds future improvements.
Binance Wallet IDO (4%): Supports the initial token launch.
Binance HODLer Airdrop (3%): Rewards Binance users who stake BNB.
Binance Marketing (3%): Promotes adoption through campaigns.
BMT on Binance HODLer Airdrops
On March 18, 2025, Binance announced Bubblemaps (BMT) as the 12th project on the Binance HODLer Airdrops program. Users who subscribed their BNB to Simple Earn or On-Chain Yields products during the eligibility period qualified for BMT rewards. A total of 30 million BMT were allocated to the program.
After the airdrop, BMT was listed on Binance with the Seed Tag applied, allowing for trading against the USDT, USDC, BNB, FDUSD, and TRY pairs.
Closing Thoughts
Bubblemaps is a unique tool that turns complicated blockchain data into easy-to-read visuals. With features like bubble charts, historical tracking, and AI-powered wallet analysis, it helps users detect trends and understand token movements. The Intel Desk and BMT token add a community-driven aspect, letting users participate in investigations and governance.
Further Reading
How to Set Up a Crypto Wallet
Your Guide to Binance Launchpad and Launchpool
What Is the Binance Airdrop Portal?
This article is for educational purposes only. This content is presented to you on an “as is” basis for general information and educational purposes only, without representation or warranty of any kind. It should not be construed as financial, legal or other professional advice, nor is it intended to recommend the purchase of any specific product or service. You should seek your own advice from appropriate professional advisors. Products mentioned in this article may not be available in your region. Where the article is contributed by a third party contributor, please note that those views expressed belong to the third party contributor, and do not necessarily reflect those of Binance Academy. Please read our full disclaimer for further details. Digital asset prices can be volatile. The value of your investment may go down or up and you may not get back the amount invested. You are solely responsible for your investment decisions and Binance Academy is not liable for any losses you may incur. This material should not be construed as financial, legal or other professional advice. For more information, see our Terms of Use and Risk Warning.
The attacker compromised the deployer key, performed a malicious upgrade, and stole $8.49 million in USD0++ to the address 0x3b33...01E5.
The attacker used the CoW Protocol to convert the stolen USD0++. The process involved swapping to USDC, then to DAI, which was crucial for handling USD0++'s low liquidity and avoiding slippage in swaps of such large amounts, like the $8.49M transaction!
🤔 What is the CoW Protocol?
It’s a liquidity aggregator that finds the best rates across various DEXs, optimizes swaps, reduces gas fees, and protects against MEV attacks. This protocol is ideal for tokens like USD0++, which may have low liquidity and require an optimized approach.
The transaction analysis shows internal transactions in liquidity sourcing, contract interactions (such as GPv2Settlement), and optimized swaps. CoW found more efficient swap routes, minimizing losses and speeding up the process.
The last update on the hack’s movement was the swap of DAI > ETH. The attacker swapped USDC for DAI again via CoW and then swapped the DAI for 4.223 ETH (~$8.3M) using the address 0x7b0c...60cf.
A hard or cold wallet is a physical device used to store your private keys offline. Unlike online wallets (such as Phantom, Exodus, Metamask, or any other), it is not constantly connected to the internet, significantly reducing the risk of cyberattacks.
☠️ • Note:
Remember that no wallet actually stores cryptocurrencies; they only store private keys, which allow you to move your assets. This is what hackers target, they try to steal your private keys or trick you into using them online to grant them control over your funds.
❓ • How so?
Hackers use various methods, such as:
• Sending malicious tokens designed to trick you into authorizing spending through their contract token.
• Making you download software that scans your personal files for saved passwords in text documents or screenshots.
• Deploying tokens with malicious contract functions that block trading and drain your funds when you attempt to trade them.
⚙️ • How does a hard wallet work?
A hard wallet stores private keys off-line. To make a transaction, the user connects the wallet to a device (via USB), manually signs the transaction by pressing a button on the physical device while offline, and then the device transmits the signed transaction to the blockchain, without exposing the private key to the internet. In addition, the device requires a PIN (an alphanumeric password of your choice) to authorize transactions. Both the software and hardware are designed with specific, tamper-proof security technologies.
🛍️ • Which one should I buy ❓
Reliable examples of hard/cold wallets include Ledger and Trezor. There are other devices available, but it's up to the user to explore and choose their preferred option.
Yeah...the amount of ETH stored in this type of protocol is always large. 🔥
EyeOnChain
--
Bullish
HACKERS’ FAVORITE CURRENCY? IT'S $ETH AGAIN. The notorious Zoth hacker has made their move. Just 17 hours ago, the attacker swapped stolen funds worth $8.32M for 4,223 #ETH at an average price of $1,968. The wallet address involved is 0x7b0cd0d83565adbb57585d0265b7d15d6d9f60cf. Zoth, a DeFi protocol focused on real-world assets (RWAs), was hacked for approximately $8.85M. After the heist, the hacker swapped the funds for 8.32M DAI and later converted it all to ETH. Interestingly, the hacker’s wallet was funded with 0.546 ETH from ChangeNow just 7 days ago. This incident once again highlights how ETH remains the top choice for #hackers looking to cover their tracks.
⛓️🕵🏻♂️🐾 I will track this movement and report back on it soon. Let's see what we can learn from this case. $ETH $SOL
EyeOnChain
--
Bullish
HACKERS’ FAVORITE CURRENCY? IT'S $ETH AGAIN. The notorious Zoth hacker has made their move. Just 17 hours ago, the attacker swapped stolen funds worth $8.32M for 4,223 #ETH at an average price of $1,968. The wallet address involved is 0x7b0cd0d83565adbb57585d0265b7d15d6d9f60cf. Zoth, a DeFi protocol focused on real-world assets (RWAs), was hacked for approximately $8.85M. After the heist, the hacker swapped the funds for 8.32M DAI and later converted it all to ETH. Interestingly, the hacker’s wallet was funded with 0.546 ETH from ChangeNow just 7 days ago. This incident once again highlights how ETH remains the top choice for #hackers looking to cover their tracks.
I already have my BMTs. BubbleMaps is really a reliable and reputable company in Blockchain analysis.
CipherX
--
Alright, fam,let’s talk about something that’s got my heart racing— $BMT and this Binance HODLer Airdrop
I mean,who doesn’t love free tokens, right?
When I heard Binance was dropping Bubblemaps ($BMT) into the HODLer Airdrop program,I couldn’t believe my luck.
I’ve been holding some BNB in my wallet, just chilling,and now it’s paying off in the best way.
$BMT isn’t just another token—it’s tied to Bubblemaps,this super cool blockchain visualization tool that’s all about spotting connections and sniffing out shady stuff on-chain.
And now,with Binance giving it the spotlight,the price has been doing a little happy dance (up 100% in a day—can you say cha-ching?).
I snagged some earlier this week, and watching it climb after the announcement felt like hitting a mini jackpot.
If you’re a $BNB BNB holder like me,check your wallet—this airdrop is our reward for sticking around.
It’s moments like these that make me love this crypto rollercoaster.
🌐⛓️ DO YOU KNOW HOW UNAUTHORIZED TRANSACTIONS CAN BE TRACKED? ⛓️🌐
❓ What Happens ❓
• You already know that Blockchain transactions are publicly recorded and accessible through block explorers like BSCscan, Etherscan, SOLscan, Bitcoin Explorer, and others. However, these transactions are not directly linked to a person’s name or identity, right?
🔍 Unauthorized transaction investigation and tracking services use these block explorers along with advanced block analysis techniques to identify transaction movement patterns.
• In other words, the public data on any Blockchain provides information that, when analyzed by someone with advanced technical knowledge, combined with fraudulent movement pattern analysis, can easily reveal the path the asset is taking until it reaches a centralized platform or service.
❓Whoa… What If the Scammer Doesn’t Use a Centralized Service?
• Well, FIAT is centralized, and there’s no way to buy fiat currency online without using a regulated service. The best a scammer can try is to hide the trail from block explorers and investigators, which also requires extremely advanced knowledge.
❓So, Does That Mean It’s Easy to Recover My Stolen Asset?
No, unfortunately, it’s not easy to recover your asset, even if the scammer is identified. Recovery depends on the cooperation of the centralized exchange freezing the funds.
"But I Saw Someone on Twitter Saying They Can Recover Any Asset" ❗
Hate to disappoint you, but that’s a lie. There is no software that can "steal back" your investment from the scammer’s wallet. There is no "hacker code" that can undo or reverse the original transaction. Unfortunately, what really exists is exactly what I mentioned earlier: a detailed analysis by a trained professional, along with an attempt to collaborate with the exchange and legal authorities to legally block and recover your assets.
Want to know more? Search for M13 Digital on X.com.
☠️ • Social Engineering: Regardless of how advanced a scammer's technique or skill may be, the weakest link in over 90% of cases is still the human factor.
1️⃣ • Fake Wallet Extension & Phishing:
Recently, a victim contacted me stating that they had been scammed. Upon investigating the situation, I found that the website they interacted with imitated the official site of a major company that was genuinely launching a token, $BMT from BubbleMaps.
The website asked the victim to download the Phantom wallet, but wait, I already have Phantom installed, why would I download it again and enter my seed?
2️⃣ • Spending Permission on Malicious Tokens:
Scams involving fake ICOs, airdrops, and misleading promotions through social media DMs from unknown profiles or ads can deceive you into interacting with malicious contracts. Many of these scams request permission to spend your tokens, which allows scammers to drain your wallet without your knowledge.
💡 • Always verify the official website of the company through the link provided in their official social media bios.
3️⃣ • Honeypot Scam & Ghost Tokens
🍯 • In a Honeypot scam, you buy or are rewarded with a token and then discover you cannot sell it, spending excessive amounts of gas every time you attempt to trade it. This scam is already embedded in the token’s smart contract code, specifically designed to drain your wallet.
👻 • Ghost tokens appear in your wallet without any explanation. You might receive a transaction with a significant amount, and assume you can make a profit before anyone notices. However, attempting to sell them may result in signing a malicious transaction that drains your funds. If a token appears "out of nowhere," ignore it and do not interact with it!
📊 Professional analysis by an MSc in Blockchain and DeFi.
If you've lost a significant amount in DeFi due to hacking, scams, draining, or a rug pull, you may already know that recovery is possible. Funds can be tracked using block explorers, specialized tools, and fraud detection techniques.
However, successful recovery depends on more than just a detailed identification report proving the scammer's address. It also requires cooperation from centralized exchanges with KYC policies, who can freeze funds and identify scammers.
There is no blockchain-based method that allows an investigator to "steal back" your funds through software or interception. Blockchain transactions are irreversible. What is possible is to trace fund movements via the Transaction ID, identify if a centralized exchange was used, and collaborate to recover assets.
Avoid scams, stay calm, and don't rush into decisions that demand urgent reinvestment. Seek an experienced professional who works with exchanges and legal channels to maximize recovery chances. Want to learn more? Had an issue or know someone who did?