In traditional journalism, following the money usually means chasing down bank records and secret paper trails. In crypto journalism, however, the trail is public and permanent—etched into the blockchain. Investigative reporters in Web3 need a unique skill set: blending financial forensics, technical analysis, and journalistic rigor. This lesson will equip you with the tools, techniques, and real-world examples to expose the truth behind tokens, wallets, and projects.
1. Following Wallets, Projects, and Token Flows
In decentralized finance (DeFi), transparency is a feature—not a bug. With the right skills, journalists can:
- Trace token movements
- Reveal insider trading
- Spot wallet coordinatio
- Follow rug pulls from origin to exit
Following Wallets:
Wallets are pseudo-anonymous but traceable. By identifying key wallet addresses—founders, treasuries, multisigs, exploiters—you can map behavior patterns.
Example:
A wallet that received early governance tokens may also vote on proposals in ways that benefit another known address, indicating collusion.
Tracking Projects and Token Flows:
Use contract addresses to monitor:
- Token mints and burns
- Liquidity movements on DEXs
- Transfers to CEXs (a common off-ramp for bad actors)
- Sudden unlocks or developer withdrawals
Red flag: A project that moves large amounts of tokens right before a price crash or after a big marketing push may be engaging in manipulation.
2. Tools for On-Chain Investigative Reporting
These tools are essential to track and verify blockchain activities:
Etherscan
- Ethereum’s block explorer
- Check wallet histories, token approvals, contract interactions
- Use internal transactions to follow proxy contracts or bridge activity
Use Case: Verifying airdrop recipients, tracking multisig treasury spending, viewing DeFi exploits in real time.
Bitquery
- Query blockchain data across multiple chains (not just Ethereum)
- Use for deeper analysis: time-series data, token price movements, volume anomalies
- Visual interface + GraphQL queries
Use Case: Spotting wash trading or coordinated wallet behaviors across DEXs.
Dune Analytics
- SQL-powered dashboards using public blockchain data
- Community-created dashboards for hacks, TVL trends, DAO voting, NFT minting
Use Case: Investigating voting behavior on Snapshot, or understanding how a protocol’s treasury has changed over time.
3. Identifying Scams, Hacks & Rug Pulls
Fraud in Web3 comes in many forms. An investigative crypto journalist should know how to identify common patterns and verify them with data.
Common Crypto Scams:
- Rug Pulls: Founders withdraw liquidity after a big hype campaign.
- Flash Loan Exploits: Abusing uncollateralized loans to manipulate DeFi protocols.
- Ponzi Tokens: Tokenomics dependent on new user inflow (e.g., early investors are paid with new investors’ money).
- Fake Partnerships: Projects falsely claiming VC support or CEX listings.
Spotting the Red Flags:
- Anonymous teams with no GitHub activity
- Promises of guaranteed returns
- Sudden token contract changes (check contract verification on Etherscan)
- Excessive insider wallet concentration
- Locked liquidity being quietly unlocked or moved
4. Real-World Investigative Case Studies
Case Study 1: The Fall of SafeMoon
- Investigation: On-chain sleuths noticed team wallets siphoning funds under the guise of development.
- Impact: Led to class-action lawsuits and plummeting token price.
- Tool Used: Etherscan wallet tracking, social media comparison, leaked wallet keys.
Case Study 2: Axie Infinity’s Ronin Hack
- Event: $625 million was drained from the Ronin Bridge.
- Investigative Approach:
- Followed transactions to laundering wallets.
- Tracked fund movements to Tornado Cash.
- Confirmed North Korea's Lazarus Group involvement via FBI statements and wallet overlaps.
Case Study 3: DAO Vote Manipulation on Beanstalk
- Exploit: Hacker took a flash loan to gain majority voting power in the DAO.
- Tools Used: On-chain governance platforms, Etherscan, Dune.
- Outcome: $182 million drained in seconds—highlighting the need for quorum safety mechanisms.
Conclusion: Trust the Chain, Question the Narrative
The decentralized world runs on code, but behind every wallet is a human intent—and that’s where crypto journalism shines. By combining blockchain transparency with investigative curiosity, journalists can uncover fraud, protect users, and hold projects accountable.
Key Takeaways:
- Wallets don’t lie—follow the data trail.
- Learn to read smart contract interactions like financial statements.
- Tools like Etherscan, Dune, and Bitquery are your best allies.
- Good investigations require patience, pattern recognition, and community input.
Disclaimer and Risk Warning
The information provided in this content by Coinpedia Academy is for general knowledge and educational purpose only. It is not financial, professional or legal advice, and does not endorse any specific product or service. The organization is not responsible for any losses you may experience. And, Creators own the copyright for images and videos used. If you find any of the contents published inappropriate, please feel free to inform us.