01 // PLATFORM
Built for the speed of the problem

From wallet to
prosecutable case.

Criminal networks don't wait for approvals. They move, they layer, they disappear. Law enforcement is bound by process, oversight, and evidence standards — and that asymmetry is where cases go cold. ShadowTrace closes that gap — trace funds in seconds, produce court-ready evidence, and build defensible cases while the intelligence is still fresh.

02 // INVESTIGATION WORKFLOW

From seized wallet to successful prosecution

1. Discover & Triage

Start with a wallet address, transaction hash, alert queue, or SAR reference. ShadowTrace pulls data instantly from our multi-chain index—Bitcoin, Ethereum, Tron, and major EVM networks—with full historical depth. Set up watchlists and receive alerts when addresses of interest transact.

Result: Prioritised queue of addresses requiring investigation

2. Investigate & Trace

Use our interactive graph canvas to expand transaction paths, cluster related wallets, and map fund flows across chains. Annotate entities, tag addresses, and collaborate with team members in shared case workspaces. Every action is logged for investigative audit trails.

Result: Complete fund-flow map with entity attributions

3. Score & Explain

Every address and transaction receives an explainable risk score. Drill into contributing factors—direct exposure, behavioural patterns, counterparty risk, mixer usage—so you can justify findings to prosecutors and build prosecutable cases.

Result: Defensible risk assessment with audit trail

4. Report & Export

Generate evidence-grade PDF reports with methodology documentation, timestamped screenshots, and reproducible audit trails. Export data to CSV or JSON for case management systems, or use our API to push findings directly to your SIEM or GRC platform.

Result: Court-ready documentation package

03 // CAPABILITIES

Case-first design. Court-ready outputs.

Four integrated capability areas designed around the way investigators actually work — from the moment a wallet is seized to the moment evidence is presented in court.

Investigation & Link Analysis

Trace funds across chains with an interactive graph canvas. Expand transaction paths, cluster related wallets, and visualise complex fund flows in a single view. Entity resolution links addresses to known exchanges, services, and flagged actors.

  • Multi-chain transaction graph
  • Automated wallet clustering
  • Entity attribution database
  • Cross-chain fund tracing

Monitoring & Alerts

Set up watchlists for addresses, entities, or transaction patterns. Receive alerts within seconds of on-chain activity. Configure risk thresholds, notification channels, and escalation workflows to match your operational requirements.

  • Sub-second alert latency
  • Custom watchlist rules
  • Webhook & email notifications
  • Threshold-based escalation

Risk & Explainability

Every address and transaction receives an explainable risk score. Drill into contributing factors—direct exposure, behavioural patterns, counterparty risk—and document your reasoning for investigative cases and prosecutors.

  • Factor-level explainability
  • Configurable risk models
  • Sanctions & watchlist screening
  • Mixer & tumbler detection

Reporting & Collaboration

Generate evidence-grade PDF reports with methodology documentation, timestamped screenshots, and reproducible audit trails. Organise investigations in shared case workspaces with notes, tags, and role-based access controls.

  • Court-ready PDF reports
  • Shared case workspaces
  • Full audit trail logging
  • CSV, JSON & API export
04 // WHO WE SERVE

Different roles. Same urgency. One platform.

Whether you're on a raid, at a desk, or building a prosecution case — ShadowTrace adapts to how you work.

Law Enforcement

Seize a wallet, trace the funds, and produce a court-ready evidence package — all before the suspect's solicitor arrives. Build prosecutable cases while the intelligence is still fresh.

05 // SEE IT IN ACTION

From first address to court-ready evidence

Four steps. One platform. Every investigation follows the same proven workflow — from discovery to disclosure.

Platform preview coming soon
06 // SECURITY & GOVERNANCE

Procurement-ready from day one.

We know your teams have questions. ShadowTrace is built to meet the standards required by law enforcement agencies and government procurement frameworks.

All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Role-based access controls, comprehensive audit logging, and SSO/SAML integration are standard. We support custom data retention policies and provide deployment options to meet data residency requirements.

SOC 2 Type II (in progress)
ISO 27001 (in progress)
AES-256 + TLS 1.3
SSO/SAML & RBAC
Full Audit Logging
Data Residency Options

Deployment Options

Cloud SaaS

Fully managed platform with automatic updates and multi-region availability. Ideal for most organisations.

Private Cloud / VPC

Dedicated instance in your preferred cloud provider (AWS, Azure, GCP) with custom data residency and network isolation.

On-Premises / Air-Gapped

Full deployment within your infrastructure for organisations with strict data sovereignty or air-gap requirements.

07 // INTEGRATIONS

Fits into your existing tech stack.

ShadowTrace integrates with your existing infrastructure through a comprehensive REST API. Push alerts to SIEM/SOAR platforms, export findings to case management systems, or build custom workflows with webhooks.

bash — 80x24
~ curl -X GET "https://api.shadowtrace.io/v1/address/bc1q..."
-H "Authorization: Bearer sk_live_..."
{
"address": "bc1q...",
"risk_score": 78,
"risk_factors": [ "darknet_exposure", "mixer_usage"],
"entity": "Unknown",
"cluster_size": 142
}
~
08 // FAQ

Questions from security and procurement

We understand onboarding a new vendor requires rigour. Here are answers to the questions we hear most often.

Where is data stored?

Cloud SaaS customers can choose between EU (Frankfurt), US (Virginia), or UK (London) data centres. Private cloud and on-premises deployments support any location you specify.

Do you support SSO?

Yes. We support SAML 2.0 and OIDC for enterprise SSO. Okta, Azure AD, and Google Workspace integrations are available out of the box. Custom IdP configurations are supported.

What certifications are you pursuing?

We are currently in the process of achieving SOC 2 Type II and ISO 27001 certification. Penetration test summaries are available under NDA as part of the procurement process.

Can we run ShadowTrace on-premises?

Yes. On-premises and air-gapped deployments are available for organisations with strict data sovereignty or security requirements. Contact us to discuss your infrastructure.

How long does onboarding take?

Cloud SaaS customers are typically operational within days of contract signature. Private cloud deployments vary based on your infrastructure requirements—we'll provide a timeline during scoping.

Do you offer training?

Yes. All plans include onboarding training. Enterprise customers receive dedicated account management, custom training sessions, and ongoing support from our investigations team.

See ShadowTrace in action.

See how investigators are turning crypto evidence into actionable leads, live seizures, and successful prosecutions — while evidence is fresh.

No commitment required