How Scans Work
UNDOXME scans operate across Web2 and Web3 data sources.
Step 1: User Input
Each tool accepts inputs such as:
Wallet address
Email
Phone number
Username
Uploaded file (image/PDF)
Step 2: Intelligence Aggregation
We query:
Public OSINT sources
Breach databases
Metadata analyzers
Blockchain analytics APIs
Dark web search indexes
Social media discovery tools
All findings are gathered into a structured format.
Step 3: Risk Scoring
Each scan produces:
Severity level
Exposure classification
Relevant timestamps
Potential identity links
Actionable guidance
Step 4: Privacy Report Generation
A report is created and stored (encrypted metadata only) for later viewing.
Last updated