Start by a Simple Search
Last updated
Last updated
On-chain investigations serve various purposes. You might be a law enforcement officer tracing illicit funds, a compliance officer assessing a user's financial risk, or an investor checking for potential issues with a project. You may also need to investigate a fraudulent transaction to track where your money went. In any case, the analysis always starts with an address or a transaction.
Using MetaSleuth requires no preparation. Simply visit our website at metasleuth.io. You don’t even need to register or log in; you’ll find the analysis entry point right away—just a simple input box.
You can enter an address, transaction hash, or ENS domain name. If you're unsure what to search for, click the search box to see popular addresses and choose one to start.
If you enter an address, wait about 1 second for a dropdown box to appear, showing all the chains where the address has been active. Click on the chain you want to analyze to view the fund flows associated with that address.
For example, if you search for 0x0629b1048298ae9deff0f4100a31967fb3f98962
and select Arbitrum, you can view the fund flow of the Radiant Capital Exploiter on that chain. Note that not all fund transfers will appear on the canvas for readability. To explore what information you can access via the Analyze feature, visit the Trace Funds - Analyze.
If you enter a transaction hash, the dropdown will typically show only one result (assuming the hash is correct). Clicking on it will reveal all the fund flows associated with that transaction. For example, try entering 0x7856552db409fe51e17339ab1e0e1ce9c85d68bf0f4de4c110fc4e372ea02fb1
, which is an attack transaction from the Radiant Capital hack event.
When you enter a transaction, MetaSleuth will display all asset transfers that occurred within that transaction. In this case, the attacker drained several pools from the project, so you will see funds coming from multiple addresses into the attacker's address.