Animated diagram — How crypto forensics follows the money

Watch the moving transaction dot as it travels through the chain. Each step shows investigators’ main actions.

Incident Ransomware / Phish / Theft Acquire Data Wallet addresses, TX IDs, logs Chain Analysis Follow TX flows, graph wallets Legal & Exchange Subpoena exchanges, KYC links Seize / Recover Freeze funds, return to victim TX Steps (what investigators do) 1. Capture addresses and evidence 2. Build transaction graph 3. Identify exchanges / KYC 4. Legal requests & wallet seizure
Incident
Where crime occurred
Acquire Data
TX IDs, IP logs, wallets
Chain Analysis
Follow on-chain flows
Exchange / Legal
Subpoena KYC
Seize/Recover
Freeze funds, return