Methodology

Our Investigation Process

A structured, professional methodology based on established digital forensics standards used by financial regulators and law enforcement worldwide.

1
πŸ“ Intake

Evidence Collection & Case Setup

Client submits wallet addresses, transaction IDs, and supporting evidence. Our intake team verifies the information and creates a secure case file. A dedicated investigator is assigned within 24 hours.

πŸ”’ Encrypted Submission πŸ“‹ Case File Creation πŸ‘€ Investigator Assignment
2
β›“ On-Chain Analysis

Blockchain Transaction Tracing

We trace the full transaction path from the victim's wallet across multiple hops. Using UTXO analysis (for BTC) and event log tracing (for ETH/EVM chains), we identify every intermediary wallet in the chain.

πŸ“Š UTXO Analysis πŸ”— Event Log Tracing β›“ Multi-chain Support πŸ” Explorer Cross-Reference
3
πŸ•ΈοΈ Clustering

Wallet Clustering & Pattern Analysis

Related wallets are grouped into clusters based on common-input heuristics, transaction timing patterns, and address reuse. This reveals the true scale of scam operations and links wallets to known entities.

🏷️ Common-Input Heuristics πŸ”„ Address Reuse Analysis ⏱️ Timing Patterns
4
🏦 Entity ID

Exchange & Service Identification

When funds reach a centralized exchange or known service, we identify the entity using on-chain signatures, known deposit address patterns, and our proprietary exchange address database (covering 200+ platforms).

🏦 Exchange Detection πŸ”€ Mixer Identification πŸ“‘ Service Fingerprinting
5
πŸ€– AI Analysis

AI Risk Scoring & Pattern Detection

Our machine learning engine analyzes 14 behavioral signals across the identified wallets: transaction frequency, dormancy, dispersion patterns, scam database matches, and more. Each wallet receives a calibrated risk score.

🧠 ML Pattern Matching πŸ“ˆ Behavioral Analysis πŸ—„οΈ Database Cross-Reference
6
πŸ“„ Evidence

Evidence Documentation & Report Creation

Findings are compiled into a professional forensic investigation report including: blockchain trace diagrams, wallet cluster maps, risk assessments, exchange identification, and recommended next steps for law enforcement or exchange reporting.

πŸ“‹ Forensic Report πŸ—ΊοΈ Flow Diagrams βš–οΈ Evidence Package
7
πŸš” Reporting

Law Enforcement & Exchange Guidance

Where identifiable exchanges are involved, we assist with formal cooperation requests. We guide clients on submitting evidence to the appropriate cybercrime units, financial regulators, and international agencies (FBI IC3, Action Fraud, Europol EC3).

🏦 Exchange Reports πŸš” Law Enforcement Packages 🌍 International Agencies
ℹ️ChainWatch does not guarantee fund recovery. Our reports provide documented evidence to support the appropriate authorities.

⏱️ Typical Timelines

Initial trace report24–48 hrs
Cluster analysis2–4 days
Full forensic report5–10 days
Exchange cooperation5–30 days

πŸ”— Supported Chains

β‚Ώ Bitcoin Ξ Ethereum BSC MATIC TRX LTC SOL ADA
Start Your Investigation