Lookup and flag risky or known blockchain addresses — exchanges, mixers, darknet markets, ransomware operators.
5 tools
c4 Wallet
Wallet artifact analysis, ownership profiling, and transaction operations.
9 tools
c4 DeFi
DeFi protocol, stablecoin, and chain-level investigation data — exploits, liquidity, and yield monitoring.
2 tools
c4 Tokens
Token symbol and contract intelligence — identify fraudulent launches, pump-and-dump schemes, and wash trading.
1 tool
TXG
Transaction graph visualization and flow tracing — map fund movements across wallets and chains.
3 tools
c4 Contract
Smart contract inspection and risk analysis — identify backdoors, hidden mints, and malicious upgrade mechanisms.
30 tools
c4 Utilities
General-purpose forensic helpers — encoding, time conversion, math, file, and text utilities.
23 tools
c4 Cyber
Suite of tools for Web Intelligence, Image Forensics, and File Forensics.
16 tools
c4 Cryptanalysis
Crypto and password analysis — hashing, cipher utilities, and cracking helpers for forensic investigations.
Workspace
c4 Cases
Case management workspace — organise investigations, track evidence, and build structured case files.
10 Tools
c4 Field
Field evidence ingestion and viewer — device artifacts, browser sessions, and memory forensics from live systems.
Recover and investigate wallets from seed phrases. Derive addresses across multiple derivation paths and analyze associated transaction history.
Deep forensic analysis of cryptocurrency wallets. Identify ownership patterns, transaction clusters, and links to known entities.
End-to-end blockchain transaction tracing. Follow the money across chains, identify obfuscation techniques, and build an evidence trail.
A searchable intelligence database of tagged blockchain addresses — exchanges, mixers, darknet markets, ransomware operators, sanctioned entities, and more.
Investigate specific cryptocurrencies: tokenomics, supply mechanics, known exploits, and on-chain behavior patterns relevant to investigations.
Monitor and investigate decentralized finance protocols. Detect exploits, rug pulls, flash loan attacks, and suspicious liquidity movements in real time.
Analyze token contracts, holder distributions, and transfer patterns. Identify pump-and-dump schemes, wash trading, and fraudulent token launches.
Forensic analysis of smart contracts. Identify malicious code, backdoors, hidden mint functions, and upgrade mechanisms used in crypto fraud.
Link on-chain activity to off-chain digital infrastructure: domains, IP addresses, email accounts, social profiles, and covert communications.
Analyze encrypted data, obfuscated communications, and hidden wallet artifacts found during digital forensic investigations.