DeFi Hack Investigation — Trace Exploit Funds Across Chains

When a DeFi protocol gets exploited, every minute counts. Attackers split funds, bridge across chains, and deposit to mixers within hours. OnChainRisk gives security researchers and protocol teams the tools to trace exploit funds in real-time across 23 blockchain networks.

How to Investigate a DeFi Exploit

1

Enter the Exploit Address

Paste the attacker wallet or the exploit contract address. OnChainRisk auto-detects the network and begins tracing immediately.

2

Map the Fund Flow

The interactive graph visualizes every hop — fund splits, bridge transfers, DEX swaps, and mixer deposits. See the full picture in seconds.

3

Follow Cross-Chain

When funds bridge to another network, OnChainRisk continues tracing on the destination chain. Supports Ethereum, Arbitrum, Optimism, Base, BSC, Polygon, and 17 more.

4

Generate Evidence

Export a court-ready PDF with timestamped transaction records, fund flow diagrams, and exchange deposit identifications for law enforcement.

What OnChainRisk Detects in Exploit Investigations

Fund splitting and peel chains used to distribute stolen assets across dozens of wallets
Mixer and privacy protocol usage — Tornado Cash, Railgun, and other obfuscation tools
Exchange deposits where attackers attempt to cash out (39+ exchanges tracked)
Cross-chain bridge transfers across all major bridges (Wormhole, Stargate, Hop, Across)
Flash loan attack patterns and reentrancy exploit signatures in transaction data
Connections to previously flagged exploit wallets and sanctioned addresses

Why Security Teams Use OnChainRisk

Speed Matters

Enterprise forensics tools take weeks to onboard. OnChainRisk is available instantly — sign up and start tracing within minutes of an exploit. No procurement, no sales calls.

23 Networks, Full Coverage

Attackers exploit on one chain and launder on another. OnChainRisk traces across Ethereum, BSC, Tron, Solana, TON, all major L2s, and 10 more networks without switching tools.

Court-Ready Evidence

Every report includes timestamped transaction hashes, fund flow visualizations, and counterparty identifications. Export as PDF, CSV, or XLSX for law enforcement and legal proceedings.

Pricing

Free

$0/mo
  • 25 investigations/month
  • All 23 networks
  • Basic fund flow graph
Most Popular

Pro

$49/mo
  • 500 investigations/month
  • Full graph with expand
  • Court-ready PDF export
  • AI investigation agent

Business

$249/mo
  • 2,000 investigations/month
  • Bulk CSV upload
  • API access (50 req/s)
  • Webhook alerts

Start Investigating an Exploit Now

Paste the attacker address and trace the full fund flow across chains in seconds.