Stop the bleeding and preserve evidence. The first 24 hours are critical — after that, funds hit mixers or OTC desks.
Speed is everything. The first hours after a theft decide whether you recover your funds or not — so don't freeze up, work the checklist below.
Submit an incident report through the form on this site. Include: what happened, the affected wallet address(es), transaction hashes of the outgoing transfers, screenshots of the wallet and any correspondence with the attacker, plus anything else that helps us reconstruct the attack. We use this to triage the case in minutes and recommend a response.
As soon as we have the data, we push the attacker's addresses into analytics feeds used by exchanges, swap services, OTC desks, and blockchain explorers. The moment a flagged address tries to deposit somewhere, risk engines catch it — the exchange freezes the transaction and blocks the withdrawal.
An analytical report is the evidence-grade document produced after a full blockchain investigation: transaction chain, clustered addresses, mixer and bridge usage, CEX touch-points, deanonymization leads. Exchanges, law enforcement, and courts accept it as formal proof.
Bring these documents with you:
Most officers don't have the tools to investigate on-chain. The stronger the dossier you bring, the faster the case actually opens.