AI-powered on-chain forensics for investigators, researchers, and security teams. Trace funds, detect Sybils, and build court-grade evidence chains.
Everything you need to investigate on-chain activity
Visualize fund flows with force-directed graphs. Expand nodes, filter by value, and discover hidden connections.
Get intelligent assistance with full context awareness. Ask questions, get explanations, and let AI guide your investigation.
Instantly identify exchanges, bridges, DeFi protocols, mixers, and known exploiters with our public labels database.
Detect coordinated address clusters using funding patterns, timing analysis, and behavioral fingerprinting.
Deep-dive into any address with transaction history, token holdings, risk scores, and connected entities.
Investigate across Ethereum, Base, Arbitrum, Optimism, Polygon, and more from a single interface.
AI-powered account authenticity analysis. Detect bots, engagement farms, AI-generated content, and coordinated inauthentic behavior.
Visualize complex fund flows and discover hidden connections
Auto-organizing graphs that reveal natural clusters and relationships
Click any node to expand and explore deeper connections on demand
Filter by value, token type, time range, or address labels
Trace routes between any two addresses through the transaction graph
Export graphs as images or interactive reports for court-grade evidence
Your intelligent investigation assistant
AI understands your current investigation, selected addresses, and graph state
Ask questions in plain English - no need to learn complex query syntax
Get specific recommendations: addresses to investigate, patterns to watch
AI can execute traces, lookups, and analysis tools on your behalf
Comprehensive address intelligence database
CEX hot/cold wallets: Binance, Coinbase, Kraken, OKX, and 50+ more
Uniswap, Aave, Compound, Curve, and all major DeFi contracts
Cross-chain bridges: Wormhole, LayerZero, Stargate, Hop, and more
Mixers, sanctioned addresses, known exploiters, and scam contracts
Add your own labels during investigations for team collaboration
Uncover coordinated wallet clusters and airdrop farmers
Detect wallets funded from common sources or through layered transfers
Identify synchronized activity windows and transaction timing anomalies
Match protocol usage patterns, contract interactions, and DeFi routes
Detect identical gas strategies and sequential nonce patterns
View detected Sybil clusters as interactive graphs with confidence scores
Comprehensive intelligence on any blockchain address
Complete portfolio breakdown with USD values, NFTs, and LP positions
Searchable, filterable history with decoded contract interactions
Composite risk score based on interactions, counterparties, and patterns
Top counterparties, frequent interactions, and relationship strength
Visual timeline of key events: large transfers, protocol interactions, bridges
Join investigators and security researchers using Auror for on-chain forensics.
Coming Soon
Social Intelligence
AI-powered account authenticity analysis
What We Detect
Automated posting patterns, unusual timing, scripted content
Coordinated likes, comments, and reposts from fake accounts
LLM-generated text patterns across multiple AI models
Paid promoters and influencers disguised as genuine users
Deep metrics analysis: engagement rates, view ratios, and anomaly detection
Powered by advanced AI for intelligent analysis