# Introduction

MetaSleuth is a crypto tracking and investigation platform. It can help monitor market movements, track fund flow of criminal activities, and DYOR to avoid scams.

:detective: **Everyone can become a sleuth in the crypto world and DYOR!**

{% hint style="info" %}
Give it a try -> <https://metasleuth.io>

MetaSleuth resources

* <https://github.com/blocksecteam/metasleuth_resources>
  {% endhint %}

## Features

* Intelligent analysis: MetaSleuth will automatically give you the most valuable interactions based on our Intelligent analysis engine for a given address.
* Cross-chain analysis: MetaSleuth supports cross-chain analysis, e.g., a token transfer from BSC to Ethereum through a bridge. All the cross-chain addresses are shown on one map.
* Sharing of the Analysis: The result can be shared (with others). Other users can further analyze the shared result, creating a collaborative community.
* Enhanced labels: MetaSleuth leverages BlockSec's address labeling system, providing enhanced labels of CEXs, scammer and hacker addresses, and other addresses we collected and verified.
* Customization: Users can customize address labels and add notes to addresses and transactions.

## Supported Chains

[Bitcoin](https://explorer.btc.com/), [Ethereum](https://ethereum.org/en/), [Binance Smart Chain](https://www.bnbchain.org/en), [TRON](https://tron.network/), [Solana](https://solana.com/), [Polygon](https://polygon.technology/), [Arbitrum](https://arbitrum.io/), [Avalanche](https://www.avax.network/), [Optimism](https://www.optimism.io/), [Base](https://base.org/), [Linea](https://linea.build/)

## Feedback

We value your input and would greatly appreciate any feedback or suggestions you may have. Please feel free to contact us through the social media channels listed below.

* Telegram: <https://t.me/MetaSleuthTeam>
* Twitter: <https://twitter.com/MetaSleuth>
* Email: <ms_support@blocksec.com>

## Tutorials

* [How to use MetaSleuth to analyze a phishing attack](https://blocksecteam.medium.com/metasleuth-how-to-use-metasleuth-to-analyze-a-phishing-attack-b525caac14c5)
* [crypto-tracking-starting-with-a-transaction](https://docs.metasleuth.io/user-manual/tutorials/crypto-tracking-starting-with-a-transaction "mention")
* [advanced-analysis-lightweight-fund-tracking](https://docs.metasleuth.io/user-manual/tutorials/advanced-analysis-lightweight-fund-tracking "mention")

## Multiple-Language

* [中文简体手册](https://docs.metasleuth.io/zh_cn)
* [中文繁体手册](https://docs.metasleuth.io/zh_tw)
* [Metasleuth ユーザーマニュアル](https://docs.metasleuth.io/ja)
* [Metasleuth Benutzerhandbuch](https://docs.metasleuth.io/de)
* [Manuel d'utilisation de Metasleuth](https://docs.metasleuth.io/fr)
* [Руководство пользователя Metasleuth](https://docs.metasleuth.io/ru)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.metasleuth.io/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
