Back to Blog

Enhance Your Onboarding Process with MetaSleuth: A Tornado Cash Case Study

MetaSleuth
February 26, 2024

Author:JP Intelligence On Chain

Background

The world of crypto has seen a lot of disruption, with thefts amounting to $3.7 billion worldwide in 2022. Even though there was a small drop in these thefts in 2023, the overall trend of online theft is still rising.

The founder of Intelligence Onchain, a research and investigations organization, as well as Armored, which is dedicated to protecting protocols from exploitation through partnerships with reputable partners such as BlockSec. In this blog, JP will provide an insightful overview of Metasleuth, which is essential in visualizing transactions in a way that is meaningful for victims, law enforcement, and lawyers.

Content

I am JP, the founder of Intelligence Onchain, a research and investigations organization, as well as Armored, a company dedicated to protecting protocols from exploitation through numerous collaborations with esteemed partners such as BlockSec.

Today, I'd like to discuss Metasleuth, a tool I use almost daily. It assists me in investigations and visualizes transactions in a way that is meaningful for victims, law enforcement, and lawyers alike. Metasleuth is the preferred visualization tool for all our investigators at IOC for our investigations. Let's delve into why using a tool like Metasleuth is of paramount importance.

Visualization Techniques

Concerning navigation, funds typically flow from left to right, though there are exceptions, especially as the charts expand. You can interact with various nodes here; for instance, this is a node, and so are these. This one represents a contract.

Tornado Cash is a protocol associated with money laundering and is illegal. Therefore, let's color it red to signify danger. Recognizing that this user is a recipient of funds from Tornado Cash, we could assign them a different shade to indicate their involvement but still denote that they're on the wrong side of the law.

As funds progress, it's theoretically less likely that this individual is the original sender, though this hinges on the transaction details. Metasleuth allows you to deep dive into a specific Ethereum address, filter transactions, and specify what you see, such as ERC-20 tokens, and pinpoint a particular time frame. This functionality is exceedingly helpful.

Figure 1:
The visualization techniques of Metasleuth, https://metasleuth.io/result/eth/0x6511f0b7ebecd902b250cdd82773102c42d03a8b?source=78b9ad12-d827-43f5-a839-dab1613459f1
Figure 1: The visualization techniques of Metasleuth, https://metasleuth.io/result/eth/0x6511f0b7ebecd902b250cdd82773102c42d03a8b?source=78b9ad12-d827-43f5-a839-dab1613459f1

Analytical Features

If we choose to analyze this address, the 'analyze' feature will showcase all the significant transactions on the left panel. Here we can see that there have been very few transactions. In terms of navigation, we have tabs for related addresses and transfers.

Figure 2:
The analytical features of Metasleuth
Figure 2: The analytical features of Metasleuth

'Related addresses' tab shows which addresses have had interactions. For example, we notice one transaction with $1,000 from Tornado, marked with a yellow exclamation point, likely indicating a zero-value token or an irrelevant event, perhaps even a scam. We have the option to hide such transactions.

Figure 3:
Related addresses in Metasleuth
Figure 3: Related addresses in Metasleuth
Figure 4: Transfer records in Metasleuth
Figure 4: Transfer records in Metasleuth

Automatic Layout

For those who prefer order, the 'automatic layout' button reorganizes everything neatly. It's important to differentiate between the 'related address' and 'transfer' tabs. The former shows a single address as the recipient from Tornado Cash, while the latter displays all incoming transactions.

Figure 5:  Automatic layout of Metasleuth
Figure 5: Automatic layout of Metasleuth

Edge List

If you click on the line connecting two nodes, it brings up an edge list. Clicking 'details' will reveal all the transaction hashes, links to them, including links to Phalcon, addresses involved, and the amounts transferred. If you're conducting an investigation and are interested in a particular edge, you can export the data to a CSV, which is handy for report generation for victims or law enforcement.

Figure 6:  Edge List in Metasleuth
Figure 6: Edge List in Metasleuth

Let's explore further what happened with the money. A substantial amount of ether has been deposited, and sorting icons help track the order of transactions by age. We can observe that a vast sum, around 900 ether worth approximately $3.6 million, has been transferred in and then out to another address.

By analyzing this next address, we can discern a pattern of transactions. Given the limited number of transactions, we may infer it's the same person involved. We'll start a new color scheme to track these transactions. Each color can represent different entities, such as purple for centralized exchanges, white for smart contracts, red for attackers, green for victims, and others as needed.

We still suspect this is the attacker, so we'll color them yellow to follow the trail of funds. We notice several deposits to Binance, which is critical because that centralized exchange deposit address will hold vital information accessible to law enforcement.

Figure 7:  The yellow color highlights money tracking results, https://metasleuth.io/result/eth/0x6511f0b7ebecd902b250cdd82773102c42d03a8b?source=1d160f69-7b24-4916-8eb7-1d235d48957d
Figure 7: The yellow color highlights money tracking results, https://metasleuth.io/result/eth/0x6511f0b7ebecd902b250cdd82773102c42d03a8b?source=1d160f69-7b24-4916-8eb7-1d235d48957d

Conclusion

Metasleuth's strength lies in its ability to track the journey of assets. We can identify additional significant amounts of ether being moved. To give you an idea of the scale, this closed loop of money laundering through Tornado Cash is about 7,400 ether, or roughly $30 million, all routed through exchanges like Kraken, Simple Swab, and Binance.

In essence, MetaSleuth facilitates the visualization and analysis of complex transaction networks, aiding in the identification and tracking of illicit funds flows.

Sign up for the latest updates
Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield
Security Insights

Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield

Looking ahead, targeted freezing events like this $6.76M USDT action will only become more common. On-chain data analysis is improving. Stablecoin issuers are also working closely with regulators. As a result, hidden illicit financial networks will be exposed.

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026

During the week of March 2 to March 8, 2026, seven blockchain security incidents were reported with total losses of ~$3.25M. The incidents occurred across Base, BNB Chain, and Ethereum, exposing critical vulnerabilities in smart contract business logic, token deflationary mechanics, and asset price manipulation. The primary causes included a double-minting logic flaw during full token deposits that allowed an attacker to exponentially inflate their balances through repeated burn-and-mint cycles, a price manipulation vulnerability in an AMM-based lending market where artificially inflated vault shares created divergent price anchors to incorrectly force healthy positions into liquidation, and a flawed access control implementation relying on trivially spoofed contract interfaces that enabled attackers to bypass authorization to batch-mint and dump arbitrary tokens.

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026

During the week of February 23 to March 1, 2026, seven blockchain security incidents were reported with total losses of ~$13M. The incidents affected multiple protocols, exposing critical weaknesses in oracle design/configuration, cryptographic verification, and core business logic. The primary drivers included oracle manipulation/misconfiguration that led to the largest loss at YieldBloxDAO (~$10M), a crypto-proof verification flaw that enabled the FOOMCASH (~$2.26M) exploit, and additional token design and logic errors impacting Ploutos, LAXO, STO, HedgePay, and an unknown contract, underscoring the need for rigorous audits and continuous monitoring across all protocol layers.

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation