Privacy Analysis
Analyze Bitcoin transactions and blocks for privacy leaks using wallet fingerprinting, clustering heuristics, and entropy scoring.
Search Online
Enter a transaction ID or block height to fetch from mempool.space and analyze privacy patterns.
How it works
The immutable digital footprint
Bitcoin operates on a transparent, immutable public ledger. Every transfer, every input, and every output leaves a permanent trace. Sherlock follows these digital footprints, uncovering the truth behind the pseudonyms.
The common input ownership heuristic
When a transaction spends multiple coins together, Sherlock assumes all those inputs belong to the same entity. This is the Common Input Ownership Heuristic (CIOH), the foundational rule that links isolated addresses into undeniable clusters.
Change always returns home
Just like paying with a ₹500 note for a ₹300 item, Bitcoin sends change back to the sender. Sherlock detects this change output using script type matching, round number analysis, and value heuristics.
Sherlock connects the dots
Using 8 independent heuristics, Sherlock classifies every transaction: simple payments, consolidations, CoinJoins, self-transfers, and more. Patterns emerge from the noise.
Ready to investigate?
Enter any transaction ID or paste raw hex to reveal the privacy fingerprint hidden in the blockchain.