Crypto Scam Investigation

A structured, evidence-based investigation to understand what happened, where funds moved, and what documentation you can use next.

We never ask for seed phrases or private keys. Submitting a request does not guarantee recovery.

What we do

  • Identify scam patterns and entry points (phishing, fake support, impersonation, investment fraud).
  • Trace on-chain flows across wallets and common bridging paths.
  • Map exposure to exchanges or service providers where relevant.
  • Deliver a clear timeline and evidence pack suitable for internal, compliance, or legal review.

What we need from you

Share only public or non-sensitive details. Do not share passwords, seed phrases, or private keys.

  • Wallet address(es) involved
  • Transaction hash(es), if available
  • Exchange / platform name(s)
  • Timeline of events
  • Screenshots / emails / chat logs (optional)

FAQ

Can you guarantee recovery?

No. We provide investigation and reporting. Outcomes depend on external parties and circumstances.

Do you need my seed phrase or private key?

No. Never share them. We work with public on-chain data and the evidence you provide.

What chains do you support?

We support major networks commonly used in scams. Share your details and we’ll confirm scope.

How long does it take?

Simple cases can be faster; complex cross-chain flows take longer. We’ll set expectations after review.