Question: Is there a utility that can help me identify recent transactions to centralized exchanges in case of a wallet hack?

FindMyTokens screenshot thumbnail

FindMyTokens

If you're worried about tracing recent transactions to centralized exchanges in case your wallet is hacked, FindMyTokens could be a useful utility. The system, designed to help you recover lost tokens by matching wallet transactions to exchange deposit addresses, produces a detailed report of interactions with centralized exchanges, including timestamps and blockchain and wallet addresses. FindMyTokens supports EVM Chains like Ethereum and Binance Smart Chain and offers two pricing tiers for individual and institutional customers.

Web3 Antivirus screenshot thumbnail

Web3 Antivirus

Another tool worth evaluating is Web3 Antivirus. This free, open-source browser extension offers a range of security features, including transaction simulation and proactive phishing protection. It blocks users from signing malicious transactions and interacting with potentially malicious assets and phishing websites. It only supports Ethereum transactions for now, but plans to expand to other chains, and offers more protection with a large website blocklist.

Lossless Aegis screenshot thumbnail

Lossless Aegis

If you're a business looking to step up your security, Lossless Aegis could be a good fit. This business-to-business tool monitors blockchain transactions in real time and uses predictive analytics to spot suspicious activity. It can help you spot potential problems before they become problems, which makes it a good choice for institutional security.

Additional AI Projects

DataTrails screenshot thumbnail

DataTrails

Provides tamper-evident and transparent audit trails for digital content and data, ensuring integrity and authenticity through verifiable metadata and immutable records.

ContractReader screenshot thumbnail

ContractReader

Analyze and interact with smart contracts across multiple networks with syntax highlighting, live on-chain values, and GPT-4 security reviews.

Edge Delta screenshot thumbnail

Edge Delta

Automates observability with real-time insights, AI-driven anomaly detection, and assisted troubleshooting, scaling to petabytes of data with flexible pipelines.

Abnormal screenshot thumbnail

Abnormal

Analyzes employee and vendor behavior, communications, and processes to stop credential phishing, business email compromise, and account takeover attacks.

Zapier screenshot thumbnail

Zapier

Automate tasks and workflows across 7,000+ apps with AI-powered technology, customizing your workflow to focus on high-priority business tasks.

Coinfeeds screenshot thumbnail

Coinfeeds

Get personalized crypto insights and real-time market data with custom portfolio monitoring, AI-powered chatbot support, and comprehensive news feeds.

Dock screenshot thumbnail

Dock

Convert verified ID data into trusted, reusable digital ID credentials, enabling instant verification and monetization while minimizing verification friction.

Basis Theory screenshot thumbnail

Basis Theory

Tokenize sensitive payment data in minutes, building secure apps and workflows with customizable payment flows and robust compliance certifications.

QueryKitty screenshot thumbnail

QueryKitty

Unlock AI-driven trading insights with a suite of tools, including a Trading Terminal, Wallet Study, and Discord Bot, to inform research and investment decisions.

Blink screenshot thumbnail

Blink

Automate security and other tasks with a no-code, low-code, or code workflow platform, leveraging thousands of pre-built integrations and AI-powered automation.

GPTZero screenshot thumbnail

GPTZero

Detects AI-generated content at sentence, paragraph, and document levels with high accuracy and low false positives, ideal for educators, writers, and professionals.

Flusk screenshot thumbnail

Flusk

Monitors over 20 Bubble-specific security points, automating audits, error monitoring, and smart deployments to ensure no-code app security and performance.

Beagle Security screenshot thumbnail

Beagle Security

Automates comprehensive penetration testing for web apps, APIs, and GraphQL endpoints, providing detailed reports with remediation recommendations.

AI or Not screenshot thumbnail

AI or Not

Detects AI-generated content in images, audio, and identity documents, helping to combat fraud and misinformation in a matter of seconds.

Toolblox screenshot thumbnail

Toolblox

Build custom, auditable smart contracts and decentralized applications without coding, using a visual interface and AI-powered workflow conversion.

Parthean screenshot thumbnail

Parthean

Automate your finances with AI-powered tools that save, invest, and pay off debt, while providing real-time insights and personalized advice.

BoxyHQ screenshot thumbnail

BoxyHQ

Protects sensitive data and AI models with encryption, access controls, and authentication, ensuring compliance and security for cloud applications.

Wolfia screenshot thumbnail

Wolfia

Automates up to 80% of security questionnaire, RFP, and RFI responses with precise, accurate, and cited answers, freeing up users to focus on higher-value tasks.

Coindive screenshot thumbnail

Coindive

Tracks crypto projects across multiple social media channels, providing customizable alerts, AI-driven weekly summaries, and relevance scoring for informed investment decisions.

Fluxguard screenshot thumbnail

Fluxguard

Automates website change monitoring, filtering, and summarization, providing actionable insights and ensuring regulatory compliance with speed and accuracy.

LangWatch screenshot thumbnail

LangWatch

Ensures quality and safety of generative AI solutions with strong guardrails, monitoring, and optimization to prevent risks and hallucinations.