Trace Stolen Crypto

We track stolen or misdirected funds on-chain and produce a clear, verifiable map of where assets moved.

We never ask for seed phrases or private keys. Submitting a request does not guarantee recovery.

What we do

  • Trace funds from the first unauthorized transaction forward in time.
  • Document splitting, swapping, bridging, and mixing behaviors when observable.
  • Highlight points of potential off-ramp exposure (exchanges/services).
  • Deliver a clean transaction timeline and evidence pack.

What we need from you

Share only public or non-sensitive details. Do not share passwords, seed phrases, or private keys.

  • Wallet address(es) involved
  • Transaction hash(es), if available
  • Exchange / platform name(s)
  • Timeline of events
  • Screenshots / emails / chat logs (optional)

FAQ

What do you need to start tracing?

Wallet address and/or transaction hash is usually enough to begin.

Can you trace through swaps and bridges?

Often yes, depending on the route. We document each step with on-chain evidence.

Do you contact exchanges?

We can document exposure; direct exchange actions typically require the victim or legal process.