Submit Case →
§ 01.1 — Specialization · Scam Investigation

When it
looked real until it didn't.

Victims of crypto fraud rarely arrive with clean data. We start where you are — a panicked message, a half-complete transaction history — and assemble the forensic picture that moves the case forward.

Intake Time
< 2 H
Avg. Case Size
$200K+
Scam Types
6 core
Partners
BitOk · GL
§ A — Typologies

Six patterns cover 90% of cases.

Every fraud has a signature. Recognizing the pattern fast-tracks tracing — infrastructure re-use is rampant.

Type 01

Phishing & Wallet Drainers

Malicious signatures approve unlimited token allowances. One click, drained in seconds. We trace the drainer contract, cluster associated wallets, and follow proceeds to off-ramps.

Type 02

Rug Pulls & Fake Projects

Liquidity removed, team vanishes. We reconstruct the deployer's funding chain back to its origin — frequently to the same address behind prior exits.

Type 03

Pig-Butchering / Romance

Long-form social engineering ending in a fake trading platform. We trace deposits past the platform's dashboard illusion to the real controller wallets — usually a professional crew.

Type 04

Fake Exchanges & OTCs

Deposits accepted, withdrawals blocked. We map the shell's real custody structure, identify hot-wallet operators, and package evidence for VASP engagement.

Type 05

Investment & Ponzi Schemes

High-yield promises backed by new deposits. We reconstruct the flow graph, evidence the Ponzi structure mathematically, and attribute exit liquidity.

Type 06

Impersonation & Support Scams

Fake support channels on Discord, Telegram, X. We identify infrastructure re-use across multiple victim incidents — cluster patterns are deterministic.

§ B — Process

From chaos to evidence in four steps.

Step 01

Intake

TXIDs, wallet addresses, amount at loss, and a narrative of how the fraud unfolded. Screenshots and communications help.

Step 02

Trace & Cluster

Receiver wallet traced across chains; associated addresses clustered using heuristics and drainer-infrastructure signatures.

Step 03

Attribute

Wallet clusters cross-referenced against known scam infrastructure and past victim reports to identify the operator.

Step 04

Engage

Evidence package delivered to Law Enforcement and relevant VASPs. Freeze requests issued where funds are reachable.

§ C — Deliverables

What you receive.

Evidentiary on-chain report (court-admissible format)
Cluster map of fraudster infrastructure
Attribution to prior incidents where applicable
Freeze request drafts for engaged VASPs
Chain of custody documentation
Ongoing advisory through recovery phase
§ — Engage

Have a case?
Start an intake.

Response within two business hours. Confidential. Success-fee terms on recovery work.