How Scans Work

UNDOXME scans operate across Web2 and Web3 data sources.

Step 1: User Input

Each tool accepts inputs such as:

  • Wallet address

  • Email

  • Phone number

  • Username

  • Uploaded file (image/PDF)

Step 2: Intelligence Aggregation

We query:

  • Public OSINT sources

  • Breach databases

  • Metadata analyzers

  • Blockchain analytics APIs

  • Dark web search indexes

  • Social media discovery tools

All findings are gathered into a structured format.

Step 3: Risk Scoring

Each scan produces:

  • Severity level

  • Exposure classification

  • Relevant timestamps

  • Potential identity links

  • Actionable guidance

Step 4: Privacy Report Generation

A report is created and stored (encrypted metadata only) for later viewing.

Last updated