Probe is powered by Clain backbone technology enabling investigators effectively trace and uncover criminal flow in blockchain transactions.
With support of over 90% of actively circulating crypto assets, we provide unparalleled insight on decentralized ecosystem by linking pseudonymous network participants with real-world actors.
Probe brings big and complex data into an interactive graph interface to quickly surface relationships between blockchain events and participants.
Start with a single point of search, such as crypto address, transaction hash, or OSINT information.
Delve into related data for interesting subsets for further analysis.
Manipulate and display data as a sequence of events with data connections.
Look for more evidence to build up a strong case or test out hypothesis
Collaboratively present case with custom annotations and notes.
Check out Probe features to bring your investigation routine to the next level. We created the tool that gives analysts full control over how data is visualized with point-and-click user interface.
We enable collaborative analysis of large-scale data at any step of investigation and allow to securely share insight within group members.
Turn massive-scale data into answers with intuitive graph interface. With filtering through different blockchains and related object, we provide an extreme flexibility in the way you can visualize output data.
It takes no more than 25 seconds on average to apply new block data and recalculate the entire platform. We do it with each block mind and keep data delay shortest among all the competitors.
We develop intelligent algorithms aimed to assist you with right steps during investigations. New incoming data will promptly suggest about the changes it brings to the current investigations.
Allows you to spend more time on analyzing the data rather than waiting for it to be processed and delivered.
Taking your privacy with extra care is a must. We isolate your sensitive data from all other products, and make sure that access to it is properly logged and monitored.
To increase access security, we employ 2FA authentication and whitelisted IPs. We also provide on premise installs, vRack position inside internal network with VPN access.