Forensic Reporting

A clear, structured report that documents what happened on-chain and what the evidence shows—written for professional review.

We never ask for seed phrases or private keys. Submitting a request does not guarantee recovery.

What we do

  • Executive summary with key findings and limitations.
  • Chronological transaction timeline with supporting evidence.
  • Wallet/service exposure summary where observable.
  • Appendix with hashes, addresses, and references.

What we need from you

Share only public or non-sensitive details. Do not share passwords, seed phrases, or private keys.

  • Wallet address(es) involved
  • Transaction hash(es), if available
  • Exchange / platform name(s)
  • Timeline of events
  • Screenshots / emails / chat logs (optional)

FAQ

Who is the report for?

Victims, internal teams, compliance, and legal stakeholders who need clear documentation.

Can you include screenshots and off-chain evidence?

Yes, if you provide them. We clearly label sources and context.