FREE TOOLS
Resources for victims and analysts.
This page is designed to build trust: practical checklists, clean workflow, and “what to do next.”
Safety: Never share seed phrases, private keys, exchange passwords, or 2FA codes. No legitimate helper needs them.
Evidence Preservation Checklist
IMMEDIATE (DO THIS FIRST)
- Screenshot: exchange login events, API keys, withdraw history, deposit history
- Export: CSVs if available (transactions, orders, withdrawals, deposits)
- Record: exact timestamps + timezone + TXIDs + wallet addresses
- Preserve: emails, texts, chats, and support tickets (PDF exports)
- If wallet: capture address + public keys (NOT private keys)
CHAIN DATA
- TXID list (chronological)
- Sender + receiver addresses for each hop
- Memo/Tag fields if applicable
- Explorer links + screenshots
DO NOT
- Post seed phrases “for help”
- Pay “recovery agents” demanding upfront fees
- Install remote-access tools for strangers
Reporting Templates (High-level)
Police Report Structure
Write like a timeline, not like a rant. Facts + exhibits + what you’re requesting.
Exchange Support Ticket
Short, precise: compromised account, timestamps, withdrawal IDs, destination address, request for preservation.
IC3 / Federal Intake
Organize into: incident summary, losses, identifiers, evidence packet, and escalation list.
Want these as downloadable PDFs later? We’ll generate them once the site is deployed.
Learn the chain
Explorers
Use official explorers for the chain you’re investigating. Always cross-check.
How to read TXIDs
Inputs/outputs, timestamps, fees, memo/tag fields. Don’t guess.
Common laundering patterns
Fragmentation, repeated rounded transfers, exchange touchpoints, tag/memo usage, bot-like timing.