4 min
What Crypto's Automated Infrastructure Can't Hide
Starting from fewer than ten known addresses, TRM researchers mapped over 470,000 previously unknown deposit addresses belonging to a major sanctioned gambling platform on TRON — expanding coverage by more than 100×. This is the story of the problem that made it possible.

The problem: Anchor points that move
The standard playbook for mapping illicit infrastructure on public blockchains starts with seed addresses — known starting points from open source intelligence (OSINT), exchange cooperation, or prior investigations — and expands outward by tracing fund flows. Seeds lead to consolidation wallets, consolidation wallets lead to off-ramps, and the map grows.
This works until it doesn't. Sophisticated actors have learned to rotate their core infrastructure: retiring key addresses, shifting to new intermediaries, segmenting flows across fresh topology. When the anchor points move, the trails from old seeds go cold. Coverage doesn't degrade gracefully — it collapses. A service processing hundreds of thousands of deposits can become largely invisible overnight.
How do you map an entity that deliberately removes the footholds analysts depend on?
Why this is a tough challenge to solve
The core limitation of seed-based expansion is that it treats addresses as the unit of analysis. It asks: "Where did the money from this address go?" That question has diminishing returns when the entity deliberately structures its flows to avoid persistent address reuse.
Clustering heuristics — grouping addresses by shared spending patterns or common ownership signals — offer partial mitigation. But clustering depends on observable links between addresses, and sophisticated deposit infrastructure is designed to minimize exactly those links. Each deposit address interacts with the broader network through a minimal, standardized set of operations, then goes silent.
The result is a detection approach that scales linearly with analyst effort and breaks nonlinearly with adversary sophistication. Every time the entity changes its infrastructure, the analyst starts over. This is the fundamental asymmetry the research set out to break.
Scale
Hundreds of thousands of deposit addresses active across a multi-year operational history. Manual tracing can't keep pace with infrastructure that regenerates faster than analysts can map it.
Rotation
Key addresses are retired and replaced on rolling cycles. Seed-based approaches lose coverage every time the entity's topology shifts, with no guarantee old seeds connect to new infrastructure.
Minimal linkage
Deposit addresses are designed to leave the smallest possible on-chain footprint. Each address performs a short, standardized sequence of operations and then goes dark — limiting the connective tissue clustering depends on.
Search space
TRON processes millions of transactions daily. Finding entity-specific patterns without knowing what to look for is computationally intractable as a brute-force search — the signal-to-noise ratio across the full chain is vanishingly small.
The insight: Automation cuts both ways
The breakthrough came from inverting the problem. Instead of asking "Where did the money go," the researcher asked: "What does the system that moves the money look like?"
Large-scale deposit infrastructure requires automation. No human operator is manually processing hundreds of thousands of individual deposits, funding gas, executing multi-step collection sequences, and routing proceeds. The economics demand software — and software behaves differently than humans.
This is the fundamental tension illicit services face: automation enables scale, but scale requires consistency — and consistency is observable. The very properties that make a system efficient enough to operate at production volume also make it distinguishable from the background activity on-chain. These behavioral signatures are properties of the software architecture, not individual addresses — which means they persist even as the entity rotates its surface-level infrastructure.
The operational trade-off is structural and not easily resolved. What machines leave behind is not a bug in their design — it is an inherent consequence of operating at scale on a transparent ledger.
What we found
Applying this analytical lens to a single sanctioned gambling platform on TRON, the research produced a comprehensive map of the entity's deposit infrastructure:

The entity operates parallel processing pathways for different asset types (TRX and TRC-20 tokens), with shared infrastructure components participating in both. The infrastructure exhibits a clear hierarchical structure: a small core of operational addresses coordinates the activity of hundreds of thousands of deposit endpoints.
Critically, the behavioral approach identified infrastructure that no amount of seed-based tracing could have reached — addresses with no direct or indirect fund-flow connection to any previously known starting point. These addresses were attributable only because they exhibited the same systemic behavioral properties as the rest of the network.
Why this matters
Two properties of this work distinguish it from conventional blockchain tracing:
Durability across infrastructure rotation
Because the detection signals are properties of the system architecture rather than individual addresses, a single analytical effort yields attribution capability that persists across infrastructure rotations. When the entity retires addresses and spins up new ones, the new infrastructure is identifiable without starting over. The signatures don't expire when the addresses do.
Discovery without prior connectivity
The method can identify addresses that share no observable fund-flow connection to any known seed. This breaks the fundamental assumption of graph-based tracing — that you need a path to find a node. It means that compartmentalization (the primary defensive strategy of sophisticated actors) is insufficient against behavioral approaches.
The hard problems we're working on
This investigation solved the problem for a single entity through deep, creative reverse-engineering — an iterative process of hypothesis, testing, and refinement that required significant researcher expertise. That process produced 99.95% precision, but it does not yet scale to the dozens of large-scale illicit services operating across multiple blockchains.
The open questions are some of the most interesting problems to solve in applied blockchain analysis:
Early results on the generalization question are promising — suggesting that the behavioral properties identified through manual analysis reflect learnable, transferable patterns. That work is the subject of a forthcoming post.
The deterrence implication
The broader point is a structural one. Illicit financial services that operate on public blockchains face an inescapable trade-off: they need automation to achieve the scale their business models require, but automation produces durable behavioral consistency that sophisticated analysis can exploit. Rotating addresses, segmenting flows, and compartmentalizing infrastructure addresses the symptoms but not the underlying cause.
We are not disclosing the specific techniques or parameters used in this investigation. What we are sharing is the conclusion: the operational trade-off between automation and detectability is fundamental, and it favors the analyst.
What machines leave behind is not a bug in their design, but an inherent consequence of operating at scale on a transparent ledger.
We're hiring researchers and engineers who want to work on problems like this. If mapping adversarial infrastructure at scale sounds interesting, check out our open roles.


