Each pillar corresponds to a class of obfuscation tactic we have solved operationally.
Ethereum, Bitcoin, Tron, BNB Chain, Polygon, Arbitrum, Optimism, Solana, Avalanche. Cross-chain bridges correlated by contract events and timing.
Common Input Ownership for Bitcoin-family chains. Gas-funding and contract-interaction heuristics for account-based chains. Entity resolution at scale.
Event-log parsing follows value across AMMs, aggregators, and proxy contracts — not just surface-level token transfers.
USDT / USDC flows across Ethereum ↔ Tron ↔ Solana ↔ BSC. Bridge correlation for funds relocated between ecosystems.
Known starting point: victim wallet, TXID, or a deposit address flagged by a VASP.
Full outbound (and where useful, inbound) graph assembled. Depth limited only by noise threshold.
Cross-chain hops resolved. Bridge transactions correlated. Clusters collapsed into entity wallets.
Each node annotated with risk score, known affiliations, and sanctions exposure. Evidence exported.
Response within two business hours. Confidential. Success-fee terms on recovery work.