Back to home
Forensic analysis

Post-hack rapid forensics

Paste a transaction hash. The Agent traces the full attack path, identifies contracts involved, reconstructs the exploit flow, and generates remediation steps.

Forensic report will appear here

Enter a transaction hash from a suspected exploit