Workflow Guide

Trace a Wallet

Analyze blockchain wallet activity and linked entities.

Identify the wallet on the right chain first, then pivot through explorers, clustering, and exposure signals.

10 direct workflow tools
0 supporting tools
2 related categories

Investigation Framework

Use this page as a working sequence, not just a list. Start broad, preserve volatile evidence, and corroborate before reporting.

Collect Leads

Record target values, search terms, timestamps, and the first source that produced each lead.

Pivot Carefully

Move from identifiers to related accounts, infrastructure, images, archives, or records only when the link is explainable.

Preserve Findings

Save screenshots, archive URLs, and keep original source links before pages change or accounts disappear.

Corroborate

Avoid single-source conclusions. Confirm important claims with independent tools, dates, and source types.

1

Start Here

Start with the strongest blockchain intelligence sources to identify the wallet, chain activity, and likely entity ties.

#1
Cryptocurrency OSINT Free Verified May 16, 2026

ARKHAM INTEL

ARKHAM INTEL is an OSINT resource for blockchain and wallet investigation workflows. It supports blockchain intelligence, wallet attribution, and crypto transaction tracing.

Open Tool
#2
Cryptocurrency OSINT Free Verified May 16, 2026

Monero Blocks

Monero Blocks provides capabilities for blockchain intelligence, wallet attribution, and crypto transaction tracing. Monero blockchain explorer - XMR blocks, transactions, payment ids, hashrate, emission. We show it all.

Open Tool
#3
Cryptocurrency OSINT Free Verified May 16, 2026

Wallet Explorer

Wallet Explorer provides capabilities for blockchain intelligence, wallet attribution, and crypto transaction tracing. WalletExplorer.com : smart Bitcoin block explorer.

Open Tool
2

Core Tools

Then move through explorers and chain-specific tools to trace flows, balances, and counterparties.

4
Cryptocurrency OSINT Free Verified May 16, 2026

Blockonomics

Blockonomics provides capabilities for blockchain intelligence, wallet attribution, and crypto transaction tracing. Check Bitcoin addresses, lookup transactions. Monitor wallet balances using xpub with our block explorer.

Open Tool
5
Cryptocurrency OSINT Free Verified May 16, 2026

Ether Scan

Ether Scan provides capabilities for blockchain intelligence, wallet attribution, and crypto transaction tracing. Etherscan allows you to explore and search the Ethereum blockchain for transactions, addresses, tokens, prices and.

Open Tool
6
Cryptocurrency OSINT Free Verified May 16, 2026

BitRef

BitRef provides capabilities for blockchain intelligence, wallet attribution, and crypto transaction tracing. Instantly check the balance of any Bitcoin address and view transactions in a clean, easy-to-read format.

Open Tool
7
Cryptocurrency OSINT Free Verified May 16, 2026

XMR Chain

XMR Chain is an OSINT resource for blockchain analysis and cryptocurrency tracing. It supports blockchain intelligence, wallet attribution, and crypto transaction tracing.

Open Tool
8
Cryptocurrency OSINT Free Verified May 16, 2026

EtherChain

EtherChain is an OSINT resource for blockchain analysis and cryptocurrency tracing. It supports blockchain intelligence, wallet attribution, and crypto transaction tracing.

Open Tool
9
Breach & Leak OSINT Free Verified May 16, 2026

Git Leaks

Git Leaks is an OSINT resource for blockchain analysis and cryptocurrency tracing. It supports investigative utilities, digital tracking, and workflow automation.

Open Tool
10
Cryptocurrency OSINT Free Verified May 16, 2026

IntelX

IntelX provides capabilities for blockchain intelligence, wallet attribution, and crypto transaction tracing. Intelligence X is a search engine and data archive.

Open Tool
3

Also Useful

Use supporting tools for leak and exposure pivots when the wallet intersects with broader security investigations.

No additional keyword-based matches.

Reporting Checkpoints

Before turning this workflow into a finding, make the chain of reasoning easy to audit.

What was observed?

Quote or summarize the source output and keep the original URL.

When was it observed?

Record collection time, page timestamps, and archive timestamps separately.

Why does it matter?

State the investigative relevance and whether it is direct evidence or a lead.

How was it confirmed?

List independent corroboration and note any uncertainty or gaps.