We compile open-source intelligence on companies, individuals and digital assets. Ownership chains, beneficial owners, sanctions, on-chain footprints, public litigation, and the people behind the names — delivered as a cited, hash-signed report. Every claim sourced. Every source cited.
Companies, holdings, beneficial owners. Built for M&A, KYC, compliance and pre-investment review.
Public-record research on individuals — beneficial owners, executives, counterparties, partners. For pre-engagement screening, M&A and litigation support.
Wallet attribution, cluster analysis, infrastructure tracing. For Web3, journalists, recovery counsel.
The report is a single, self-contained document — HTML for working review, PDF for printing and archival. Every finding is numbered, severity-graded, and cited to a public source we can name. Where confidence is low, we say so. Where the record is silent, we don't fill it.
The Pro tier is SHA-256 signed for integrity verification and built to support third-party reproduction of every cited finding.
SEE A SPECIMEN →You describe the target, the question, the depth. We confirm scope, jurisdictions and exclusions in writing.
Quote and case-ID issued. Payment in USDT-TRC20. Work begins on confirmation.
Open-source acquisition: registries, courts, regulators, archives, on-chain, social, breach data, press.
Cited report, hash-signed. One-week Q&A window included with every package.
A redacted specimen of our corporate due diligence report. All names, entities, dates, jurisdictions and identifying details have been altered or removed. Structure, methodology and citation density are representative of our actual deliverable.
Free. Sent to your email.
Acquirers ask us to vet a seller's beneficial owner before signing. Typical scope: parallel holding structures, hidden affiliates, undisclosed exposures the data room missed. Delivered ahead of close, in time to renegotiate or walk.
Compliance teams ask us to check a prospective counterparty before onboarding — UBO chains, licensing verification, sanctions exposure, infrastructure overlap with previously-flagged entities. Used to support — not replace — internal KYC.
Journalists and investigative outlets ask us to reconstruct ownership and funding chains across registries. Typical work: tracing layered corporate structures across jurisdictions, registry by registry, with every step citable from the public record.
DAOs and treasury councils ask us to vet service providers and grant recipients. Typical scope: corporate identity resolution, on-chain treasury flows, exposure to flagged mixers or sanctioned addresses.
We do not break into systems, impersonate people, bribe officials, buy stolen data, or pay for access to private databases. Every claim in our report must be reproducible from a public source. If we cannot cite it, we do not write it.