FREE TOOLS

Resources for victims and analysts.

This page is designed to build trust: practical checklists, clean workflow, and “what to do next.”

Safety: Never share seed phrases, private keys, exchange passwords, or 2FA codes. No legitimate helper needs them.

Evidence Preservation Checklist

IMMEDIATE (DO THIS FIRST) - Screenshot: exchange login events, API keys, withdraw history, deposit history - Export: CSVs if available (transactions, orders, withdrawals, deposits) - Record: exact timestamps + timezone + TXIDs + wallet addresses - Preserve: emails, texts, chats, and support tickets (PDF exports) - If wallet: capture address + public keys (NOT private keys) CHAIN DATA - TXID list (chronological) - Sender + receiver addresses for each hop - Memo/Tag fields if applicable - Explorer links + screenshots DO NOT - Post seed phrases “for help” - Pay “recovery agents” demanding upfront fees - Install remote-access tools for strangers

Reporting Templates (High-level)

Police Report Structure

Write like a timeline, not like a rant. Facts + exhibits + what you’re requesting.

Exchange Support Ticket

Short, precise: compromised account, timestamps, withdrawal IDs, destination address, request for preservation.

IC3 / Federal Intake

Organize into: incident summary, losses, identifiers, evidence packet, and escalation list.

Want these as downloadable PDFs later? We’ll generate them once the site is deployed.

Learn the chain

Explorers

Use official explorers for the chain you’re investigating. Always cross-check.

How to read TXIDs

Inputs/outputs, timestamps, fees, memo/tag fields. Don’t guess.

Common laundering patterns

Fragmentation, repeated rounded transfers, exchange touchpoints, tag/memo usage, bot-like timing.