Back to home
Forensic analysis
Post-hack rapid forensics
Paste a transaction hash. The Agent traces the full attack path, identifies contracts involved, reconstructs the exploit flow, and generates remediation steps.
Forensic report will appear here
Enter a transaction hash from a suspected exploit