Methodology

This page documents the exact process used to produce every investigation published on this site. Readers should be able to open any report, read the “Material of investigation” section, and reproduce the conclusions end-to-end from public data alone.

1. Scope - what this site investigates

Published reports focus on four categories:

  1. Confirmed crypto thefts - wallets drained by private-key compromise, exchange hacks, or exploit of a permissionless protocol, where the stolen funds can be traced on-chain.
  2. Suspicious fund flows - patterns of transfers (e.g., circular flows, sanctioned-platform passage, deliberate address churn) consistent with obfuscation or laundering.
  3. NFT-whale wallet attribution - grouping of multiple addresses under a single operational actor based on deterministic on-chain evidence.
  4. On-chain context for public enforcement actions - mapping the on-chain surface of entities designated by OFAC or seized by law enforcement.

The site does not publish: speculation unsupported by on-chain evidence; private data obtained through non-public means; personal data (address, phone, family) beyond what is already in public corporate filings.

2. Data sources

Every source listed here is public and independently queryable by any reader.

Blockchain data

Regulatory & corporate data

Web state preservation

3. Attribution rules

Clustering multiple addresses under a single “actor” is one of the highest-error-risk steps in on-chain forensics. The following rules are applied.

3.1 Accepted evidence for co-control of two addresses

3.2 Rejected evidence for co-control

3.3 Representation in reports

4. Language conventions

Every report uses the following vocabulary consistently.

Term used Meaning
is / was A statement verifiable on-chain by any reader at any time (e.g., “0xabc is the to_address of transaction 0x…”).
on-chain evidence shows The conclusion follows deterministically from a cited set of transactions.
is consistent with The pattern matches a known class of behaviour (e.g., laundering), but the pattern is also consistent with alternative explanations, which are considered in the text.
appears to / it is plausible that Inference where evidence is circumstantial; the reader is invited to evaluate it.
alleged A claim attributed to a third party; no independent endorsement by this site.

The site avoids definitive claims of intent (“X is laundering money”, “Y is a fraudster”) because intent cannot be inferred from on-chain data alone. Reports describe behaviour; readers and authorities assess intent.

5. Report lifecycle

  1. Draft - written against raw data; not published.
  2. Reproducibility pass - every transaction hash, address, and external link is re-fetched; any that fail are removed or replaced.
  3. Right-of-reply outreach - if the report names an individual or entity, they are contacted via the most public channel available (corporate contact form, X DM, registered email) prior to publication. Responses received during a 7-day window before publication are included.
  4. Publication - report goes live with an ISO publication date in the front-matter.
  5. Updates - any factual change is logged in the report with an “Update [date]:” note; the original text is not silently edited. See Corrections.

6. Reproducibility standard

A report passes the reproducibility standard if a third party, starting from only:

can, within a few hours, re-verify every transaction hash, every corporate filing citation, and every address attribution cited in the report. Reports that fail this standard are revised or retracted.

7. Known limitations

8. Feedback and correction requests

See the Corrections page for how to submit a correction request, right-of-reply, or additional evidence.