Crypto

OSINT context for the wallet
behind the transaction.

On-chain analysis (Chainalysis, TRM, Elliptic) tells you where the funds moved. OSINT tells you who controls the wallet, what they've publicly said, what other identities link to them, and whether they're on a sanctions list. Tracelight is the OSINT layer that complements your on-chain stack for crypto investigations + exchange compliance.

What this fixes.

PAIN 1
On-chain analysis stops at the wallet address — identity attribution is OSINT work.
Knowing a wallet received $5M doesn't help much without knowing who controls the wallet. Twitter handles, GitHub identities, breach-corpus emails — all of those bridge the wallet-to-person gap.
PAIN 2
Exchange-account-holder vetting at scale is hard.
Exchange compliance teams need to vet account holders for sanctions + adverse-media + politically-exposed-persons status — same OSINT workflow as any other regulated industry, but with crypto-specific identifiers (wallet addresses, exchange handles) as primary inputs.
PAIN 3
Sanctions screening on crypto identifiers requires OFAC + Treasury Web Address List cross-checks.
OFAC publishes specific wallet addresses tied to sanctioned entities. Manual cross-checks during compliance review are tedious; automated screening at transaction time isn't always available.
What gets checked

8+ data sources running in parallel.

Cross-platform identity correlation including crypto handles (Twitter, GitHub, Discord)
OFAC + Treasury sanctioned-wallet-address list cross-check
Dark-web mention search for exchange handles + wallet addresses
Adverse media + retraction database for principal identification
Breach corpus matching for account-holder emails
Corporate registry data for exchange-counterparty entities
Court records for prior crypto-related litigation
Cross-case intelligence — same wallet across other investigations
What you get

The report that lands on your desk.

  1. 1
    Wallet-to-identity attribution summary with confidence + supporting signals
  2. 2
    Sanctions screening result with specific list matches
  3. 3
    Counterparty + entity context where wallet links to corporate structure
  4. 4
    Cross-case intelligence — same wallet or identifier across other investigations
  5. 5
    Citation appendix with on-chain references + OSINT source records

Common questions.

Do you replace Chainalysis / TRM / Elliptic?+

No — Tracelight is the OSINT layer that complements on-chain analytics. The on-chain stack tells you the flow of funds; Tracelight tells you the identity context. Most serious crypto-investigation teams run both.

How fresh is the OFAC sanctioned-wallet list?+

We sync the OFAC SDN sanctioned digital currency address list on each enrichment run. Real-time-as-of-OFAC-publication is the SLA.

Does this support DEX + cross-chain attribution?+

Tracelight isn't a chain-aware tool — we don't trace DEX trades or cross-chain bridges. We attribute identities given a wallet address or exchange handle. Pair with a chain-aware tool for the bridge-tracing layer.

Run a sample crypto identity workup — free for 7 days.

No credit card. Cancel anytime. Same product, same OSINT workers, same audit trail — just scoped to your investigation.

Other use cases
M&A diligence
M&A & pre-acquisition due diligence
Surface sanctions hits, undisclosed litigation, key-person liability, and reputational red flags before LOI. Citation-anchored reports your legal team can defend.
Background checks
Background checks
Pre-employment screening with FCRA-aware citation trails. 32 parallel workers cover criminal records, sanctions, dark-web exposure, and adverse media — far beyond a stock credit-report background check.
Fraud / insurance
Fraud & insurance investigations
Claim verification, social-media surveillance, address history, and behavior pattern analysis. Built for SIU teams and fraud investigators who need court-ready evidence.
Journalism
Investigative journalism
Source vetting + cross-platform identity correlation for investigative reporters. Verify identities, surface conflicts of interest, and audit your own sourcing trail before publication.
Skip tracing
Skip tracing
Find people who've gone off the grid. 32 OSINT workers correlate aliases, addresses, social activity, and breach exposure to surface a current location lead.
Expert witness vetting
Expert witness vetting
Before you depose them or hire them, run an expert through 32 OSINT workers. Surface prior testimony, conflict of interest, credentials disputes, and reputation risks before they cost the case.
Litigation support
Litigation support
Adverse party discovery, witness vetting, asset-search leads, and impeachment ammunition for civil + criminal litigators. Citation-anchored, deposition-defensible.
Asset search
Asset search
Find what they own — entities, properties, vehicles, hidden affiliates — for collection actions, judgment enforcement, divorce discovery, and pre-litigation settlement leverage.
Insurance / SIU
Insurance claim investigation
Catch claim fraud before payout. Social-media surveillance, address history, cross-claim pattern detection, and court-ready evidence preservation for SIU teams.
Cyber IR
Cyber incident response
Attacker attribution, breach-victim notification context, dark-web exposure verification, and indicator pivoting for IR teams + MSSPs. Citation-anchored, fast.
Executive protection
Executive protection
Pre-event venue threat assessment, named-target social-media monitoring, doxx-exposure baseline, and travel security briefs for EP teams.
Real estate
Real-estate diligence
Counterparty + entity verification + sanctions screening + adverse-media checks for commercial real-estate transactions. AML-aware.
Brand protection
Brand protection
Surface lookalike domains, employee impersonation accounts, dark-web mentions of your brand + customer data exposure. Continuous monitoring with severity-graded alerts.