ETH Watchtower
Real-Time Blockchain Forensics & Risk Scoring
Request Demo Read Whitepaper Github (Watchtower)

The Problem: Speed and Opacity.

Every single block, malicious actors deploy scam tokens and factory-generated fraud. Investigators are drowning in noise and flying blind:

Sophisticated researchers need more than a file explorer. They need real-time intelligence.

Core Modules

1. Live Monitor

Real-time event streaming. Filter 100,000+ events without lag the millisecond they hit the mempool.

2. Risk Engine

Composite risk score (0-100) based on heuristic weightings. Transparent logistic regression models, not black boxes.

3. Graph Explorer

Visual intelligence. Automatically cluster contracts by bytecode hash and map deployer relationships.

Detection Methodology.

Vulnerability Detection

  • Reentrancy paths
  • Unchecked delegatecall
  • Signature malleability
  • Integer truncation

Honeypot Mechanics

  • Fake token implementations
  • Hidden minting & fee-on-transfer
  • Phony renounced ownership
  • "Return bomb" contracts

Proxy Behavior

  • Metamorphic redeployment
  • Selector clash risk
  • Self-destruction paths

Control-Flow Risk

  • Infinite loops
  • Gas-dependent logic
  • Factory-driven expansion

The Alpha: Network Graph & Bytecode Pivot.

Scammers reuse code. We catch them.

ETH Watchtower automatically clusters contracts by bytecode hash and visualizes the deployer ecosystem.

Platform Interface.

Visualizing the Dark Forest.

Case Studies: Real Threats Neutralized.

1. The Hidden Tax Honeypot

Scenario: A token launched with "0% Tax" marketing.

Watchtower Detection: Identified a hidden _taxFee variable set to 99% in the unverified constructor arguments.

Outcome: Flagged as CRITICAL (98/100) 12 seconds after deployment.

2. The "Pepe" Copycat Ring

Scenario: 14 seemingly unrelated tokens launched simultaneously.

Watchtower Detection: Graph Explorer clustered all contracts by bytecode hash and linked them to a single Tornado Cash funded deployer.

Outcome: Identified as a coordinated rugpull ring before liquidity was added.

Technology: Built for Speed & Privacy.

React 19 + TypeScript + SQLite
A responsive frontend backed by a robust architecture.

Memory-Efficient Log Ingester
Handles massive datasets.

High-Throughput Go API
Custom backend services written in Go for historical data aggregation and cross-chain signal normalization.

Epoch-Aware Analysis
Parses historical boundaries (The Merge, Shanghai, London) to apply context-specific heuristics rather than generic scanning.

Local-First Forensics
Case management and investigation notes are stored locally. We don't see your alpha.

Modular Design
Decoupled 'MetricsEngine' allows plugging in new risk models instantly.

Our Philosophy.

Blockchains are transparent machines. Security intelligence should be transparent too.

Rather than hiding analysis behind proprietary walls, Watchtower treats the chain as a public library of code, incentives, and human creativity — sometimes brilliant, sometimes malicious, always fascinating.

By illuminating how contracts actually behave, the tool contributes to a safer and more self-aware cryptoeconomic ecosystem.

Business Model & Traction.

1. Local Researcher

Open Source / Free

  • Full forensic dashboard
  • Local-first privacy
  • Bring-Your-Own-Keys

2. Pro Analyst

Hosted SaaS

  • Persistent Case Files
  • Cloud-hosted Node Access
  • Team Collaboration

3. Enterprise API

Institutional

  • Raw JSON Data Streams
  • Custom Risk Models
  • SLA Support

Frequently Asked Questions.

How is the risk score calculated?

The score (0-100) is a composite of weighted heuristics including bytecode analysis, liquidity patterns, and ownership controls. It is deterministic and explainable, not a black box.

Can I customize the detection models?

Yes. The 'MetricsEngine' is modular. Institutional clients can adjust weightings or plug in proprietary risk models to match their specific threat tolerance.

Is this financial advice?

No. ETH Watchtower provides forensic data and behavioral analysis. It is a tool for research and security assessment, not investment recommendations.