Blockchain Forensics: Foundations, Obfuscation, and Tracing
Section VIII: Forensics
Army Cyber Institute
U.S. Military Academy
April 9, 2026
Recall: UTXO vs. Account Model
Bitcoin (UTXO)
Ethereum (Account)
How value moves
Outputs are created and consumed — each coin has a traceable history
Balances update in place — accounts persist and change state
Tracing unit
Individual UTXOs (discrete coin fragments)
Addresses and contract interactions
Where evidence lives
Transaction inputs and outputs
Transaction record + event logs + internal call traces
Hidden value flows
Rare — the tx record is mostly complete
Common — ERC-20 transfers and internal calls are invisible without parsing logs
Primary heuristic
Common-Input-Ownership (CIOH)
Contract interaction clustering
Reminder: Bitcoin’s UTXO Model
Transactions consume old outputs and create new ones. Every satoshi has a traceable ancestry.
Implication: If you know one input address, the Common-Input-Ownership Heuristic (CIOH) lets you cluster all co-spent inputs as the same owner. Outputs can be identified as payment vs. change using heuristics.
Reminder: Ethereum’s Account Model
Accounts persist. Transactions update balances — and trigger contract code, which may move value through many more contracts in a single block.
Implication: The top-level transaction may show $0 ETH transferred. All value movement is in the logs. You must parse every contract’s event log to follow the money.
The Analyst’s Mindset: Graph Thinking
Blockchain forensics is fundamentally graph analysis. On-chain data is represented as a network of nodes and edges to uncover patterns of activity.
Nodes: Addresses, UTXOs, or entity clusters — a real-world actor assumed to control all addresses in the cluster.
Edges: Transactions or value flows between nodes.
By identifying recurring motifs — fan-outs, fan-ins, peeling chains — analysts can infer entity behavior and intent.
Graph Motif: The “Fan-Out”
A Fan-Out occurs when a single source sends to many destinations.
Graph Motif: The “Fan-In”
A Fan-In consolidates many inputs into a single destination.
Ethereum Forensics: Where the Evidence Hides
A top-level Ethereum transaction tells you only part of the story.
What the transaction record shows:
from / to / value (ETH transferred)
Gas used, status (success/fail)
What it doesn’t show:
ERC-20 / ERC-721 token transfers
Internal calls between contracts
Flash loan amounts
DEX swap token flows
A DeFi swap may show $0 ETH in the top-level transaction while moving $10M in stablecoins — all recorded only in event logs.
Following Token Flows: ERC-20 Transfers
ERC-20 tokens (USDT, USDC, WETH, etc.) are the dominant form of value in DeFi. Their transfers are invisible in the main transaction record.
Every ERC-20 transfer emits a log event from the token contract:
Transfer(address indexed from, address indexed to, uint256 value)
Forensic implication: To trace USDT, USDC, or any token, you must query the token contract’s event logs — not the sending transaction.
Smart Contract Forensics
Three patterns every Ethereum forensics analyst must recognize:
Proxy Contracts (EIP-1967)
The address you see called on-chain is a thin shell that forwards all calls to a separate implementation contract. The code executing is NOT at the address you’re looking at. Analysts must resolve the proxy to understand what ran.
Flash Loans
Borrowed and repaid within a single transaction — creating a distinctive trace signature of a massive inflow immediately followed by repayment. Often the first step in price manipulation exploits. The entire attack can happen in one block.
Reentrancy
The same contract is called multiple times recursively within a single transaction trace. A classic exploit pattern (The DAO, 2016) — detectable in traces but invisible at the transaction level.
These patterns are only visible in transaction traces (debug_traceTransaction). Etherscan’s UI parses some of this, but automated forensic investigation requires trace-level data from an archive node or a provider like Alchemy/Infura.
Address Clustering
The foundational rule for clustering Bitcoin addresses is the Common-Input-Ownership Heuristic (CIOH): If a transaction has multiple inputs, all inputs are controlled by the same user — because signing requires possession of all corresponding private keys.
By repeatedly applying CIOH, a single known address can expand into a large cluster — providing a complete picture of an entity’s activity.
Heuristic #2: Change Address Detection
In the UTXO model, transactions often have two outputs: one to the payee, one back to the sender as change. Identifying the change output expands an entity’s cluster.
Heuristic Indicators:
New Address: Change address is brand new with no prior history.
Script Type Match: Change address script (e.g., P2WPKH) matches the input addresses.
No “Round” Number: Payees receive round amounts (e.g., 0.1 BTC); change is the un-round remainder.
Wallet Fingerprinting: Some wallets use a predictable output index for change (e.g., Electrum historically placed change at output index 1).
Address Reuse: If one output has appeared in prior transactions, it is likely the known payee — making the other output the change.
Heuristic #3: Peeling Chains
A peeling chain is a sequential pattern where an entity repeatedly “peels” small amounts off to destinations while sending the bulk to a new change address.
Analogous to financial “structuring” — used to send funds to high-risk destinations in small increments. Tools like Chainalysis Reactor and Elliptic Investigator automate detection by traversing transaction graphs algorithmically.
Pitfalls & Counter-Heuristics
Heuristics are educated guesses, not ground truth. Blind reliance leads to errors.
CIOH Fails: Deliberately broken by CoinJoin — multiple users co-sign a single transaction. Assuming common ownership here falsely merges distinct entities.
False Change: Not all two-output transactions have change. A user could simply be paying two people. Misidentifying the payee as change misdirects the investigation.
Wallet Variations: Different wallets — and versions of the same wallet — behave differently. A heuristic tuned to one wallet may fail silently on another.
Exchange UTXO Consolidation: Exchanges regularly sweep thousands of customer deposits into shared hot wallets. Applying CIOH to these sweeps falsely merges thousands of unrelated users into a single “entity” — a significant source of false positives in commercial tools.
Key Point: Heuristic-based findings are probabilistic leads, not definitive proof. Always seek corroborating evidence.
Counter-Heuristic #1: CoinJoin
CIOH works because only the owner of all private keys can create a valid multi-input transaction. This assumption is the foundation of most Bitcoin clustering.
CoinJoin pools multiple users’ inputs into a single transaction, deliberately breaking CIOH by severing the link between sender and receiver.
Legal Status (2024): Operators of Samourai Wallet were arrested on money laundering and unlicensed money transmission charges. Wasabi Wallet subsequently shut down its CoinJoin coordinator for U.S. users. Whether non-custodial CoinJoin coordination constitutes a crime is actively litigated.
Obfuscation Service: Mixers & Tumblers
A mixer breaks the chain of custody by pooling funds and redistributing them.
Mixers can be centralized services or decentralized smart contracts (e.g., Tornado Cash, sanctioned by OFAC in 2022 for laundering funds for North Korean state actors).
Breaking Mixers: Investigative Countermeasures
Despite their obfuscation, mixers have exploitable weaknesses:
Timing Analysis: If the pool has low volume, a deposit at time T can be correlated with a withdrawal at T + δ. Many mixers use insufficient time delays.
Amount Correlation: Mixers that don’t standardize output denominations leak information. A deposit of 3.47 BTC with a subsequent withdrawal of 3.44 BTC (minus fee) is a strong candidate.
Graph Clustering: The mixer’s own deposit and withdrawal infrastructure can be clustered. Investigators label the mixer, then focus on post-withdrawal behavior.
Operational Security Failures: Users reuse addresses, withdraw directly to KYC exchanges, or leave OSINT trails — collapsing anonymity at the human endpoint.
Investigator’s Principle: You rarely break the mixer cryptographically. The chain of custody almost always fails at the human endpoints, not the protocol.
The Next Generation: Privacy Pools
In response to Tornado Cash sanctions, Privacy Pools attempts to balance privacy with compliance.
Like a mixer: Uses zero-knowledge proofs (ZKPs) to break the deposit-withdrawal link. A ZKP proves a statement is true without revealing the underlying data — like proving you’re over 18 without showing your birthdate.
Compliance twist: Users can generate a ZKP proving their funds did not originate from a known illicit source (a public blocklist) — without revealing which deposit is theirs.
“My withdrawal is one of 100 in this pool, and it is NOT from the 5 known illicit deposits.”
Privacy Pools is still experimental (co-authored by Vitalik Buterin). It represents a broader trend: cryptographic tools that provide privacy to legitimate users while reducing the utility of the system for illicit actors — rather than treating privacy and compliance as opposites.
The Shift in Strategy: Privacy-Preserving Blockchains
While CoinJoin and mixing add obfuscation on top of transparent ledgers, some cryptocurrencies are designed with privacy as their default, primary feature.
Transparent Ledgers (Bitcoin, Ethereum): The entire transaction graph is public. Forensics is about analyzing the graph.
Privacy-Preserving Ledgers (Monero, Zcash): The graph is intentionally hidden or broken. Forensics shifts to metadata, endpoints, and voluntary disclosures.
Monero (XMR): Privacy by Default
Monero hides the sender, receiver, and amount of every transaction by default via three technologies:
Ring Signatures: Hides the sender. The true input is mixed with “decoy” UTXOs — an observer cannot determine which was spent.
Stealth Addresses: Hides the receiver. A new one-time address is created per transaction; the recipient’s public address is never recorded on-chain.
RingCT: Hides the amount. Amounts are encrypted, but miners can verify no new money was created.
Monero: Known Forensic Weaknesses
Despite strong privacy, Monero has known investigative attack surfaces:
Historical ring size failures: Pre-2017 Monero used ring size 1 — making those transactions fully traceable. Older outputs on the chain retain this weakness.
Endpoint correlation: Monero must be bought and sold at exchanges. Correlating a XMR purchase (known amount, known time) with a subsequent sale of similar value and timing remains a viable approach — even without touching the chain.
IRS bounty program: In 2020, the IRS awarded contracts to Chainalysis and CipherTrace to develop Monero tracing capabilities — indicating the government believes partial tracing is achievable under specific conditions, though the results remain classified.
Monero’s Ring Signature, Visualized
The true input is hidden among several decoys. The signature proves one is spent, but not which.
An outside observer sees 4 plausible senders. The transaction graph is broken.
Zcash (ZEC): Optional Privacy
Zcash supports both transparent and fully shielded transactions in the same chain.
Transparent (t-addr): Identical to Bitcoin — fully public and traceable.
Shielded (z-addr): Sender, receiver, and amount hidden via zk-SNARKs.
Transaction Type
Privacy
t-addr → t-addr
None — fully traceable
t-addr → z-addr
Shielding (entry visible, exit hidden)
z-addr → z-addr
Full privacy
z-addr → t-addr
De-shielding (exit visible, entry hidden)
The level of privacy depends on shielded pool activity. In practice, the majority of ZEC transactions have historically used transparent addresses — the anonymity set of the shielded pool remains small, making shielded-to-transparent correlation easier than Zcash’s design implies in theory.
Forensic Limitations & Voluntary Disclosure
On-chain analysis of privacy coins is often a dead end. Investigations pivot to:
Endpoint Analysis: Focus on exchanges where privacy coins are bought or sold — the on-ramps and off-ramps remain the weakest link.
Off-Chain Intelligence: Server logs, informant tips, wallet files from seized devices.
View Keys: Both Monero and Zcash have view keys — read-only keys that grant a third party access to transaction history without spending capability. Useful for compliance audits; rarely available in criminal investigations.
Subpoenas & MLATs: Domestic KYC records via subpoena. International records require a Mutual Legal Assistance Treaty (MLAT) — a formal government-to-government evidence-sharing process that can take months to years, making rapid asset freezing nearly impossible in cross-border cases.
Quantum Computing: Future Impact on Privacy Coin Forensics
Protocol
Vulnerable Primitive
Quantum Impact
Bitcoin / Ethereum
ECDSA / secp256k1
Shor’s algorithm could derive private keys from spent addresses, retroactively linking wallets
Monero
Ed25519 ring signatures + EC-based RingCT
Ring signatures could be cracked, exposing the true sender in historical transactions
Zcash (shielded)
zk-SNARKs over BLS12-381 curves
Proofs could be broken, revealing shielded sender, receiver, and amount
“Harvest now, decrypt later”: Adversaries may already be archiving privacy coin transaction data, betting on future quantum capability to retroactively de-anonymize it. Privacy used today may not be private forever.
The Modern Launderer: “Chain Hopping”
Illicit actors rarely stay on one chain. Chain hopping exploits the fact that blockchains are separate, siloed ecosystems.
Typical pattern:
Exploit/Crime on Chain A (e.g., Ethereum).
Swap into a liquid or privacy-preserving asset.
Bridge to Chain B (e.g., TRON, Solana).
Obfuscate on Chain B via local mixers or DEXs.
Bridge to Chain C or cash out at a high-risk exchange.
TRON has become the dominant chain for illicit fund movement due to near-zero transaction fees and widespread USDT liquidity. UN and Chainalysis reports consistently flag TRON-based USDT transfers as the preferred mechanism for sanctions evasion, ransomware cashouts, and North Korean laundering operations.
Mechanisms for Chain Hopping
Two primary technologies enable chain hopping:
Cross-Chain Bridges: Lock an asset on the source chain; mint a wrapped equivalent on the destination chain. Many are decentralized and operate without KYC — prime targets for abuse. (e.g., RenBridge was heavily used for laundering before being shut down.)
Atomic Swaps / DEXs: Trade assets from different chains directly, without a centralized intermediary — severs a clear custody trail with no shared record.
Following the Hop: Cross-Chain Forensics
An investigator correlates the “exit” on one chain with the “entry” on another.
Correlation signal: timing (Δt = 3 min) + approximate value match (~$500k).
Not All Hops Are Equally Opaque
Hop Type
Traceability
Smart contract bridge (e.g., Wormhole)
High — lock and mint events are on-chain on both sides
Centralized exchange swap
Medium — traceable with legal process (KYC subpoena)
DEX / atomic swap
Low — only timing and value correlation available
Privacy coin intermediary (e.g., XMR)
Very low — middle leg is cryptographically hidden
Smart contract bridges are actually the most traceable hop type — both the locking event and the minting event appear in on-chain logs and can be directly correlated. Privacy coin hops are the hardest: the middle leg leaves no on-chain record at all.
The Final Step: Attribution
Attribution links a pseudonymous on-chain cluster to a real-world entity.
OSINT: Search for addresses on social media, forums, code repositories, paste sites. Many services and individuals post crypto addresses openly.
Labeled Datasets: Chainalysis, Elliptic, and community sites (Etherscan, BitcoinAbuse) maintain vast databases of labeled addresses for exchanges, mixers, darknet markets, and sanctioned entities.
Direct Interaction (Undercover): Create an account or transact with a target service to obtain a fresh, investigator-controlled address — a technique analogous to a controlled buy in drug investigations. That address becomes a confident graph seed.
Exchange Subpoena (Most Common Final Step): Trace funds to an exchange deposit address, then compel the exchange via legal process to reveal the KYC identity behind that account. This is the single most common mechanism linking blockchain activity to a real-world arrest.
Attribution: Standards of Evidence and Known Pitfalls
Attribution is inferential. Quality and legal admissibility vary significantly by source.
Source
Strength
Limitation
OSINT (forum post)
Weak lead
Self-reported, easily faked
Analytics firm label
Strong indicator
Proprietary — methodology not always disclosed
Undercover interaction
Strong
Requires legal authority and operational resources
KYC subpoena
Court-admissible
Requires jurisdiction; MLAT delays for foreign exchanges
Attribution: From Cluster to Identity
Warning
Known Error Cases: Analytics firm labels have been challenged in court. In United States v. Roman Sterlingov (Bitcoin Fog operator), defense experts disputed Chainalysis attribution methodology. Treat probabilistic findings as investigative leads, not proof.
Conclusion: A Cat-and-Mouse Game
Blockchain forensics is a dynamic, adversarial field.
Illicit actors adopt privacy coins, decentralized bridges, and novel obfuscation patterns to stay ahead.
The transparency of most blockchains provides a permanent, immutable record. The challenge lies in reading that record when it has been intentionally obscured.
Analyst’s Working Principles:
Follow the endpoints. Mixers and privacy chains obscure the middle — but funds almost always enter and exit at identifiable services. Start and end there.
Heuristics are leads, not proof. Probabilistic clustering is an investigative tool, not court-admissible evidence. Corroborate before asserting attribution.
Opsec fails before cryptography does. The vast majority of de-anonymizations happen because of human mistakes — reused addresses, KYC exchanges, OSINT trails — not because a cryptographic protocol was broken.
Case Study: The Bitfinex Hack (2016)
In August 2016, a hacker breached the Bitfinex cryptocurrency exchange, stealing approximately 119,754 BTC (worth ~$71 million at the time, but billions later).
For five years, the funds barely moved. Then, a highly sophisticated laundering operation began.
The Launderer’s Playbook:
Automated peeling chains to slowly siphon funds.
Depositing funds into darknet markets (like AlphaBay) to use them as makeshift mixers.
Chain hopping into Monero (XMR) to break the public ledger trail.
Using fictitious shell companies to justify cash-outs to traditional bank accounts.
Live Trace: Following the Peeling Chains
The launderers used automated scripts to move the stolen BTC through thousands of small, rapid transactions. This is a classic peeling chain.
The Input: A large chunk of stolen BTC.
The Peel: A small fraction sent to a darknet market or exchange.
The Change: The remaining balance sent to a new, fresh address controlled by the launderers.
The Pattern: 1 input \(\rightarrow\) 2 outputs. Repeated thousands of times.
Interactive Walkthrough: Let’s look at the actual chain.
Breaking the Obfuscation: Account Clustering
The launderers sent thousands of “peels” into virtual currency exchanges (VCEs) using dozens of different user accounts, hoping to look like many unrelated users.
How investigators clustered the accounts:
On-Chain Clustering (CIOH): The launderers occasionally swept funds from multiple deposit addresses into a single transaction to pay for network fees, accidentally proving they owned all of them.
The AlphaBay Seizure: The launderers used the AlphaBay darknet market to mix funds. But in 2017, law enforcement seized AlphaBay’s servers. The “mixer” suddenly became a giant, unencrypted database of the launderers’ internal transfers.
Once investigators traced the funds exiting the mixers and entering legitimate exchanges, they hit the chokepoint. They served legal subpoenas to the exchanges.
The Subpoena Returns:
Fake Identities: Accounts were registered to fictitious names and stolen Russian passports.
The OpSec Failure: The accounts logged in using IP addresses associated with a specific cloud hosting provider in New York.
The Gift Cards: One of the exchange accounts was used to purchase a $500 Walmart gift card. The subpoena revealed the gift card was delivered to a personal email address.
The PlayStation: Another portion of the funds was traced to the purchase of a PlayStation, shipped to a physical apartment address in Manhattan.
OSINT: “The Crocodile of Wall Street”
The email addresses and physical shipping addresses from the subpoenas led investigators to a married couple: Ilya Lichtenstein and Heather Morgan.
Investigators immediately pivoted to Open Source Intelligence (OSINT) to build the profile:
LinkedIn/Forbes: Morgan was a regular contributor to Forbes, writing articles about “protecting your business from cybercriminals.”
Social Media: Morgan had a highly public alter-ego as a comedic rapper named “Razzlekhan,” self-described as the “Crocodile of Wall Street.”
Business Records: They operated several tech startups, which were used to justify the sudden influx of cash entering their traditional bank accounts.
The Intelligence Fusion: The on-chain cluster of stolen Bitfinex funds was now irrevocably tied to two real, highly visible people living in New York City.
The Takedown and The Cloud Seizure
With the identity confirmed, law enforcement obtained a search warrant for Lichtenstein’s cloud storage accounts (linked to the IP addresses from the exchange logins).
The Final Evidence:
Inside the cloud storage, agents found an encrypted spreadsheet.
Upon decryption, the spreadsheet contained a list of 2,000 virtual currency addresses and their corresponding private keys.
These keys perfectly matched the addresses holding the unspent, stolen Bitfinex funds.
February 2022: Lichtenstein and Morgan were arrested. Using the recovered private keys, the DOJ executed the largest financial seizure in U.S. history, recovering approximately 94,000 BTC (valued at $3.6 billion).
Key Lesson: Six years of sophisticated laundering — peeling chains, privacy coin hops, DeFi layering — ultimately failed because of a single KYC link at an exchange, a Walmart gift card, and a cloud storage account. OpSec fails before cryptography does.
[1]
J. Gjorgjev, M. F. Ramadhan, and S. Dhamayana, “Blockchain forensics - unmasking anonymity in dark web transactions,”International Journal of Criminology and Sociology, vol. 14, pp. 68–75, Mar. 2025, doi: 10.6000/1929-4409.2025.14.07.
[2]
S. Salisu and V. Filipov, “Blockchain forensics: A modern approach to investigating cybercrime in the age of decentralisation,”International Conference on Cyber Warfare and Security, vol. 18, pp. 338–347, Feb. 2023, doi: 10.34190/iccws.18.1.947.
[3]
M. Fröwis, T. Gottschalk, B. Haslhofer, C. Rückert, and P. Pesch, “Safeguarding the evidential value of forensic cryptocurrency investigations,”Forensic Science International: Digital Investigation, vol. 33, p. 200902, 2020, doi: 10.1016/j.fsidi.2019.200902.
TRM Labs, “TRM Labs Reports and White Papers: Blockchain Intelligence and Crypto Risk Insights.” 2025. Available: https://www.trmlabs.com/reports
[6]
H. F. Atlam, N. Ekuri, M. A. Azad, and H. S. Lallie, “Blockchain Forensics: A Systematic Literature Review of Techniques, Applications, Challenges, and Future Directions,”Electronics, vol. 13, no. 17, p. 3568, Jan. 2024, doi: 10.3390/electronics13173568.
J. B. Sykes and N. Vanatko, “Virtual Currencies and Money Laundering: Legal Background, Enforcement Actions, and Legislative Proposals,” Congressional Research Service, Washington, D.C., CRS Report R45664.2, Mar. 2019. Available: https://www.congress.gov/crs_external_products/R/PDF/R45664/R45664.2.pdf
[10]
U.S. Dept. of Treasury, “U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash,” United States Government, Washington, D.C., Press Release, Aug. 2022. Accessed: Oct. 28, 2025. [Online]. Available: https://home.treasury.gov/news/press-releases/jy0916
[11]
Privacy Pools Documentation, “What is privacy pools?” Accessed: Mar. 28, 2026. [Online]. Available: https://docs.privacypools.com/
R. Avice, B. Haslhofer, Z. Li, and J. Zhou, “Linking cryptoasset attribution tags to knowledge graph entities: An LLM-based approach.” 2025. Available: https://arxiv.org/abs/2502.10453
[20]
D. Lin et al., “Track and trace: Automatically uncovering cross-chain transactions in the multi-blockchain ecosystems.” 2025. Available: https://arxiv.org/abs/2504.01822