Quick Start Guide
Get started with your first investigation in under 60 seconds
Step 1: Access the Application
Navigate to the main Blockchain Detective interface. You'll see a clean, minimalist chat interface designed for focus and clarity.
Step 2: Enter a Bitcoin Address
In the input field, paste any Bitcoin address you want to investigate. The system supports all Bitcoin address formats:
- Legacy (P2PKH): Starts with
1(e.g.,1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa) - Legacy (P2SH): Starts with
3(e.g.,3J98t1WpEZ73CNmYviecrnyiWrnqRhWNLy) - SegWit (Bech32): Starts with
bc1q(e.g.,bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh) - Taproot (Bech32m): Starts with
bc1p(e.g.,bc1pxwww0ct9ue7e8tdnlmug5m2tamfn7q06sahstg39ys4c9f3340qqxrdu9k)
Try investigating this example address to see the system in action:
1AJbsFZ64EpEfS5UAjAfcUG8pH8Jn3rn1F
This address has a rich transaction history perfect for demonstration.
Step 3: Watch the Investigation
Once you submit the address, the investigation begins immediately. You'll see three sections appear:
Thinking Section (Collapsible)
This shows the real-time reasoning process with line numbers. You'll see:
- API calls being made (tool calls)
- Data retrieved (tool results)
- Analytical reasoning
- Decision-making logic
Analysis Progress
The investigation proceeds through these phases:
- Fund Flow Phase: Tracks the largest incoming transaction
- Multi-Path Phase: Analyzes all major outflows
- Pattern Detection: Identifies mixers and exchanges
- Report Generation: Compiles findings into actionable intelligence
Final Report
When complete, you'll receive a comprehensive markdown-formatted report containing:
- Executive Summary: Key findings at a glance
- Address Statistics: Total received, sent, balance
- Investigation Results: Both fund flow and path analysis
- Mixer Detection: Any obfuscation attempts identified
- Exchange Activity: Known exchange deposits found
- Actionable Recommendations: Next steps for law enforcement or victims
- Recovery Assessment: Likelihood of fund recovery
Step 4: Download the Report
At the bottom of each investigation, you'll find a "Download Report (.txt)" button. This saves the complete investigation including both the reasoning process and final analysis.
The report is formatted as:
<think>
[Full reasoning trace with API calls and decisions]
</think>
[Markdown-formatted final analysis]
Understanding the Output
Status Indicators
Look for these emoji indicators in reports:
- 🎯 Exchange Deposit: Funds reached a KYC exchange (high recovery potential)
- ⚠️ Mixer Activity: CoinJoin or mixing service detected
- 🟢 Clean Path: No obfuscation detected
- 🟡 Heuristic Match: Probable exchange based on behavior
- 🔴 No Exchange: No exchange deposits identified
- 🛑 Trail End: Investigation endpoint reached
Reading Confidence Scores
Each detection includes a confidence score:
- Mixer Detection: X/13 points (≥7 = high confidence)
- Exchange Behavior: X/10 points (≥7 = high confidence)
- Confirmed Exchange: Always 100% confidence (in database)
Common Investigation Scenarios
Scenario 1: Theft Victim
You had Bitcoin stolen and want to know where it went:
- Investigate your address that received the stolen funds
- Look for exchange deposits in the report
- If found: Contact the exchange's fraud department with police report
- If not found: Set up monitoring for future movements
Scenario 2: Law Enforcement
Building a case for legal action:
- Run investigation on suspect's known address
- Document all exchange deposits found
- Use report as evidence for subpoena applications
- Download report for case files
Scenario 3: Due Diligence
Verifying source of funds for compliance:
- Investigate the sending address
- Check for mixer usage (red flag)
- Verify connection to legitimate exchanges
- Document findings for compliance records
Tips for Best Results
- Be Patient: Comprehensive investigations can take 30-90 seconds
- Save Reports: Download investigations for future reference
- Check Recent Activity: Funds may move to exchanges days or weeks later
- Follow All Leads: Multiple exchange deposits increase recovery chances
- Understand Limitations: Very old addresses may have incomplete data
Next Steps
Now that you understand the basics:
- Learn about Deterministic AI and why it matters
- Understand Mixer Detection to recognize obfuscation
- Read the Law Enforcement Guide for investigative best practices