🟪🟪🟪 Purple: Shuffle-MEV-bots.
🟦🟦🟦 Cyan: Key transactions identified.
🟧🟧🟧 Orange: Key persons identified.
🟥🟥🟥 Red: Key wallet addresses identified.
This repository contains a Python-based forensic analysis of blockchain wallet activity related to a cryptocurrency exploit.
It uses Pandas for data cleaning and Plotly for interactive visualization of transactional behaviors, wallet categories, and relationships between entities (EOAs, smart contracts, and exploit-related addresses).
Shows overall transaction flow segmented by entity type, highlighting disproportionate activity in exploit-associated wallets.
Demonstrates which address categories rely more heavily on smart contracts versus EOAs (Externally Owned Accounts).
Scatter plot visualizing incoming vs outgoing transaction counts.
Exploit-related addresses appear as outliers, with asymmetric send/receive ratios.
Highlights the most active participants in the exploit network, revealing high-frequency wallets linked to MEV bots and laundering nodes.
This repository supports blockchain forensic efforts aimed at mapping out post-exploit fund movements.
By categorizing and visualizing transactional behaviors, this analysis helps identify laundering strategies and CEX/DeFi bridge points used to obfuscate stolen funds.
👤 Author: @jlucus
This analysis investigates transaction data extracted from two CSV datasets:
Address.csv— metadata about wallet addresses (names, contract flags, etc.)Transactions.csv— raw transaction-level data between addresses
The goal is to classify and visualize address behaviors to reveal:
- Patterns of exploit activity
- Flow between exploiters, exchanges (CEX), and DeFi protocols
- Links between individual and contract-level wallets
The script performs the following steps:
-
Data Loading and Cleaning
- Reads address and transaction data
- Normalizes “Is Smart Contract” fields
- Computes total transaction counts per address
-
Categorization of Entities
- Classifies each address into categories such as:
ftx_mev_botftx_hack_tokenftx_associatedcex(Centralized Exchanges)defi(DeFi protocols)individual(personal wallets)exploiterunlabeled
- Categorization is rule-based using address names and flags
- Classifies each address into categories such as:
-
Visual Analytics
- Generates four key visualizations:
-
Transaction Volume by Category (Bar Chart)
Compares total transaction activity across wallet types. -
Smart Contract vs EOA Distribution (Stacked Bar Chart)
Highlights contract-heavy versus externally owned address groups. -
Transaction Behavior Scatter Plot
PlotsTX ReceivedvsTX Sentto reveal outliers and exploit movement. -
Top 10 Addresses by Total TX Volume (Horizontal Bar Chart)
Displays the most active wallets with category context.
-
- Generates four key visualizations:
Install all required packages before running the notebook or script:
pip install pandas plotly
🚀 Usagegit clone https://github.com/<your-username>/crypto-hack-analysis.git
cd crypto-hack-analysisPlace your data files in the project root:
Address.csv
Transactions.csvRun the analysis script:
python3 plot_analysis.py
Interactive charts will render directly in your browser or notebook.📈 Example Output
1. Total Transaction Volume by Address Category
Log-scaled bar chart highlighting which wallet types dominate transaction flow.2. Smart Contract vs EOA Distribution
Stacked view showing contract prevalence by category.3. Received vs Sent Scatter Plot
Visual correlation between incoming and outgoing activity.4. Top 10 Most Active Wallets
Quick reference for high-volume participants in the exploit ecosystem.🔍 Notes
The categorization logic is customizable — you can add new labels by editing the categorize_address() function.Datasets can be sourced from Etherscan, Nansen, or internal blockchain forensic exports.
Plotly visualizations are interactive (zoom, hover, filter).
This repository is part of a broader blockchain forensics effort to trace exploit-related funds through decentralized and centralized systems.
By combining data-driven labeling with visual analytics, the analysis reveals behavioral signatures of wallets involved in complex laundering and arbitrage chains.
This project is released under the MIT License — free to use and modify for research, educational, or investigative purposes.





