About

Who runs this site

CryptoKarl013 is an independent, pseudonymous blockchain forensics researcher. The purpose of the site is to publish evidence-based, reproducible on-chain investigations into cryptocurrency theft, NFT-whale activity, and illicit fund flows on Ethereum, Solana, and related networks.

This is an independent research project. It is not affiliated with any exchange, law-enforcement agency, commercial blockchain-analytics vendor, or litigation service. All work is self-funded; optional donations (disclosed on the Contact page) help offset costs of paid data sources and hosting.

Why pseudonymous

Publishing on-chain research that involves large wallets, sanctioned entities, and adversarial actors attracts targeted harassment, legal intimidation, and retaliation attempts against researchers. A pseudonym reduces that attack surface while still allowing the work itself to be fully verified - every claim in every report is checked against public blockchain data that any reader can independently reproduce.

Pseudonymity does not mean anonymity. The identity CryptoKarl013 is consistent across multiple public platforms (listed below), has been active since 2025, and has a growing public record of published research. A reader who wants to assess the author’s credibility can do so through the portfolio rather than through a real-world name.

Verifiable identity

The following accounts are all operated by the author of this site. Cross-linking is intentional so that any one of them can be used to verify authenticity of the others.

Platform Handle URL
Website cryptokarl013.xyz https://cryptokarl013.xyz/
GitHub @cryptokarl013 https://github.com/cryptokarl013
X (Twitter) @CryptoKarl013 https://x.com/CryptoKarl013
Telegram @cryptoinvestigations013 https://t.me/cryptoinvestigations013
Facebook profile 61577352392394 https://www.facebook.com/profile.php?id=61577352392394
Email cryptokarl013@gmail.com cryptokarl013@gmail.com

If you see the name “CryptoKarl013” used anywhere else, it is either a reference to this author or an impersonation - the handles above are the only authoritative ones.

What “independent blockchain forensics” means here

This site publishes on-chain analyses - investigations whose conclusions are drawn from transaction data that lives on public blockchains. The author does not perform penetration testing, smart-contract auditing for clients, or off-chain OSINT consulting as a commercial service. The research pipeline, documented in full on the Methodology page, is:

  1. Identify a reportable event (theft, suspicious fund flow, sanctioned-entity interaction).
  2. Collect raw transaction data from public blockchain sources.
  3. Trace fund flows using deterministic on-chain evidence - transaction hashes, contract calls, signer analysis.
  4. Cross-reference with publicly available labels (Arkham Intelligence, Etherscan, Solscan, Chainabuse, OFAC releases).
  5. Document every claim with a linkable source.
  6. Publish under a permanent URL with a stated publication and last-modified date.

Everything a reader sees in a report should be independently reproducible from the cited sources alone. If a claim in a report cannot be reproduced that way, that is a defect in the report - please report it via the Corrections page and it will be corrected or retracted.

Public tools and data sources used

All of the tools below are public. This site does not use privileged data, leaked data, or non-public exchange-internal information.

Every report includes a “Material of investigation” section listing the specific sources used for that report.

Editorial stance

Portfolio

The published body of work is the author’s primary credential. See the Reports index for the complete catalogue.

Contact

For tips, corrections, right-of-reply requests, or collaboration, see the Contact page.