skip to Main Content
CipherTrace is hiring! See our current job openings.

for 800
Virtual Assets

Home » Cryptocurrency Intelligence

Securing the Crypto Economy

CipherTrace™ delivers the world’s most comprehensive cryptocurrency intelligence. It includes the capability to trace more than 800 virtual assets, including BTC, BCH, ETH, ERC-20, Tether, and LTC tokens.

This enhanced platform represents a giant leap by shedding light on previously dark areas of the crypto economy. It provides visibility into 87% of global trading volume with hundreds of millions of attribution data points.

By making cryptocurrency safe and trusted, CipherTrace is helping to drive widespread adoption, government acceptance and, ultimately, a multi-trillion-dollar global cryptoeconomy.

Cryptocurrency Anti-Money
Laundering, Crypto AML

Blockchain Forensics and
Bitcoin Investigations

Regulatory Supervision

Threat Intelligence


Our Platform

The CipherTrace™ platform was designed by world-class eCrime, Payment and FinTech experts and its cryptocurrency intelligence embodies their deep experience and cybercrime threats models. The platform’s core capabilities include advanced attribution capabilities, very fast engine, powerful API, alerting, and proprietary clustering algorithms that enable participants and governments to understand and manage crypto asset market risks.

Advanced Attribution Aggregation

The CipherTrace™ platform maintains the industry’s most accurate pool of attribution data. This includes 522 million attribution data points—such as account type, account holders, contract types, contract owners and other metadata—on cryptocurrency addresses. It aggregates and curates millions of open source and private references, geolocation data, and decoy deception data as well as human intelligence and expertise gained from deep relationships with regulators, law enforcement, and exchanges.

Combined with CipherTrace’s proprietary algorithms, digital enrichment, advanced clustering and tradecraft, the result is unparalleled traceability and resolution to previously unknowable public blockchain information. The solution integrates attribution data from CipherTrace’s intelligence gathering and analyst team, private intelligence sources, and open-source intelligence (OSINT). CipherTrace analysts add, on average, more than 1.5 million attributions to this massive data lake each week.

The platform also enables trusted members of a community to share a pool of threat intelligence with other members, enhancing the CipherTrace community’s collective intelligence.


  • Proprietary CipherTrace discovery algorithms and analysts
  • Public sources
  • Honeypots and other active capture sources
  • Trusted communities, including law enforcement and regulators
  • CipherTrace Crypto Recovery Network
  • APWG eCrime Exchange (eCX)

Proprietary Clustering Algorithms

This enhanced crypto intelligence correlates vast arrays of indicators and research using a variety of proprietary clustering techniques, advanced statistical methods.and cybercrime threat models to provides users with precise, actionable analytics. Its easy-to-use interface also allows nontechnical users to trace transactions across the blockchain and uncover relationships or attributes that indicate elevated risk.

Automated Transaction Risk Scoring

CipherTrace calculates risk scores for transactions based on whether the funds have been tainted by traveling through suspicious paths or being associated with known bad actors or geographies. The platform’s analysis engine can trace large address sets and then assign risk scores to suspicious transactions or patterns of transactions. Bulk upload and analysis of transactions and addresses can speed up complex investigations and audits. It also delivers the ability load past transactions to, for example, comply with requests from FinCEN.

The CipherTrace platform’s delivers automated risk scoring of transactions, wallets, and entities such as exchanges.

Calculate Cryptocurrency Risks.
Perform Deeper Investigations.

De-Anonymizing Capabilities

While the pseudo-anonymous nature of cryptocurrencies makes tracing transactions possible, the enormous complexity of the blockchain also makes it impractical to manually ferret out indicators of risk for specific transactions. CipherTrace uses pattern recognition, interactive visualization, a graph database, an advanced API and other technologies to de-anonymize cryptocurrency transactions.

Powerful and Easy to Use Search

The CipherTrace platform requires no special expertise. A user simply types or pastes a cryptocurrency address or Transaction ID into the Search field. Even with only a partial address, intelligence in the search engine fills in the available valid addresses that match what is entered in the search field.

Its powerful blockchain search engine then displays a valuable set of basic data attribution data. It then very quickly returns the date and amount of the transaction, transaction ID, addresses—even the geographic location to which the transaction was sent, and the wallet address of any cryptocurrency change returned.

Graphic Transaction Tracing Enables Intuitive Analysis

Users can then move into the analysis, which starts with a visual representation of the transaction. The users can then step forward and backward and explore the transaction history.

The platform’s intuitive user interface makes it easy to perform deeper inspection and analysis of suspicious transactions. Once a transaction is identified as high-risk or non-compliant, the user can click to drill down and look for relationships such as clusters, or search back through related transactions or multiple parts of a transaction and see any useful patterns.

Using this state-of-the-art investigation environment, even non-technical users can gain actionable insights into transactions and wallets.

API and Bulk Analysis Enable Heavy Transaction Volumes

The industry-leading CipherTrace API provides near real-time transaction risk scoring for exchanges, financial institutions, and other high-volume use cases. The API also can trigger deeper analysis required for Suspicious Transaction Reports (STRs) and Suspicious Activity Reports (SARs) such as those required by FinCEN and other regulatory bodies. Exchanges and auditors can also bulk load past transactions to go back in time and build the auditable data required by regulators.

Back To Top