This is some text inside of a div block.
Home
/
TRM Tech Blog
/
What Crypto's Automated Infrastructure Can't Hide
Engineering
May 5, 2026

4 min

What Crypto's Automated Infrastructure Can't Hide

Starting from fewer than ten known addresses, TRM researchers mapped over 470,000 previously unknown deposit addresses belonging to a major sanctioned gambling platform on TRON — expanding coverage by more than 100×. This is the story of the problem that made it possible.

XX
[
Aymen Jaffry,
 ]

The problem: Anchor points that move

The standard playbook for mapping illicit infrastructure on public blockchains starts with seed addresses — known starting points from open source intelligence (OSINT), exchange cooperation, or prior investigations — and expands outward by tracing fund flows. Seeds lead to consolidation wallets, consolidation wallets lead to off-ramps, and the map grows.

This works until it doesn't. Sophisticated actors have learned to rotate their core infrastructure: retiring key addresses, shifting to new intermediaries, segmenting flows across fresh topology. When the anchor points move, the trails from old seeds go cold. Coverage doesn't degrade gracefully — it collapses. A service processing hundreds of thousands of deposits can become largely invisible overnight.

How do you map an entity that deliberately removes the footholds analysts depend on?

Why this is a tough challenge to solve

The core limitation of seed-based expansion is that it treats addresses as the unit of analysis. It asks: "Where did the money from this address go?" That question has diminishing returns when the entity deliberately structures its flows to avoid persistent address reuse.

Clustering heuristics — grouping addresses by shared spending patterns or common ownership signals — offer partial mitigation. But clustering depends on observable links between addresses, and sophisticated deposit infrastructure is designed to minimize exactly those links. Each deposit address interacts with the broader network through a minimal, standardized set of operations, then goes silent.

The result is a detection approach that scales linearly with analyst effort and breaks nonlinearly with adversary sophistication. Every time the entity changes its infrastructure, the analyst starts over. This is the fundamental asymmetry the research set out to break.

Scale

Hundreds of thousands of deposit addresses active across a multi-year operational history. Manual tracing can't keep pace with infrastructure that regenerates faster than analysts can map it.

Rotation

Key addresses are retired and replaced on rolling cycles. Seed-based approaches lose coverage every time the entity's topology shifts, with no guarantee old seeds connect to new infrastructure.

Minimal linkage

Deposit addresses are designed to leave the smallest possible on-chain footprint. Each address performs a short, standardized sequence of operations and then goes dark — limiting the connective tissue clustering depends on.

Search space

TRON processes millions of transactions daily. Finding entity-specific patterns without knowing what to look for is computationally intractable as a brute-force search — the signal-to-noise ratio across the full chain is vanishingly small.

The insight: Automation cuts both ways

The breakthrough came from inverting the problem. Instead of asking "Where did the money go," the researcher asked: "What does the system that moves the money look like?"

Large-scale deposit infrastructure requires automation. No human operator is manually processing hundreds of thousands of individual deposits, funding gas, executing multi-step collection sequences, and routing proceeds. The economics demand software — and software behaves differently than humans.

This is the fundamental tension illicit services face: automation enables scale, but scale requires consistency — and consistency is observable. The very properties that make a system efficient enough to operate at production volume also make it distinguishable from the background activity on-chain. These behavioral signatures are properties of the software architecture, not individual addresses — which means they persist even as the entity rotates its surface-level infrastructure.

The operational trade-off is structural and not easily resolved. What machines leave behind is not a bug in their design — it is an inherent consequence of operating at scale on a transparent ledger.

What we found

Applying this analytical lens to a single sanctioned gambling platform on TRON, the research produced a comprehensive map of the entity's deposit infrastructure:

A small number of infrastructure nodes manage a vast network of deposit addresses. The layered structure — from core operational addresses to the hundreds of thousands of deposit endpoints — was mapped from fewer than ten starting points.

The entity operates parallel processing pathways for different asset types (TRX and TRC-20 tokens), with shared infrastructure components participating in both. The infrastructure exhibits a clear hierarchical structure: a small core of operational addresses coordinates the activity of hundreds of thousands of deposit endpoints.

Critically, the behavioral approach identified infrastructure that no amount of seed-based tracing could have reached — addresses with no direct or indirect fund-flow connection to any previously known starting point. These addresses were attributable only because they exhibited the same systemic behavioral properties as the rest of the network.

Why this matters

Two properties of this work distinguish it from conventional blockchain tracing:

Durability across infrastructure rotation

Because the detection signals are properties of the system architecture rather than individual addresses, a single analytical effort yields attribution capability that persists across infrastructure rotations. When the entity retires addresses and spins up new ones, the new infrastructure is identifiable without starting over. The signatures don't expire when the addresses do.

Discovery without prior connectivity

The method can identify addresses that share no observable fund-flow connection to any known seed. This breaks the fundamental assumption of graph-based tracing — that you need a path to find a node. It means that compartmentalization (the primary defensive strategy of sophisticated actors) is insufficient against behavioral approaches.

The hard problems we're working on

This investigation solved the problem for a single entity through deep, creative reverse-engineering — an iterative process of hypothesis, testing, and refinement that required significant researcher expertise. That process produced 99.95% precision, but it does not yet scale to the dozens of large-scale illicit services operating across multiple blockchains.

The open questions are some of the most interesting problems to solve in applied blockchain analysis:

Problem Why it's hard
Generalization Can behavioral classification transfer across entities that use different software, different chains, and different operational patterns — without being hand-tuned for each one?
Scale Scanning full-chain behavioral features is computationally expensive. Finding efficient search strategies that don't sacrifice recall is an active constraint satisfaction problem.
Adversarial robustness Once actors learn that behavioral consistency is a detection surface, they will attempt to introduce noise. The question is whether the noise budget they can afford is large enough to evade detection without breaking their own operations.
Multi-chain transfer Behavioral signatures identified on one chain may not transfer directly to others with different transaction models, fee structures, and timing characteristics. Abstracting the right invariants is nontrivial.

Early results on the generalization question are promising — suggesting that the behavioral properties identified through manual analysis reflect learnable, transferable patterns. That work is the subject of a forthcoming post.

The deterrence implication

The broader point is a structural one. Illicit financial services that operate on public blockchains face an inescapable trade-off: they need automation to achieve the scale their business models require, but automation produces durable behavioral consistency that sophisticated analysis can exploit. Rotating addresses, segmenting flows, and compartmentalizing infrastructure addresses the symptoms but not the underlying cause.

We are not disclosing the specific techniques or parameters used in this investigation. What we are sharing is the conclusion: the operational trade-off between automation and detectability is fundamental, and it favors the analyst.

What machines leave behind is not a bug in their design, but an inherent consequence of operating at scale on a transparent ledger.

We're hiring researchers and engineers who want to work on problems like this. If mapping adversarial infrastructure at scale sounds interesting, check out our open roles.

XX
[
Aymen Jaffry,
 ]
Subscribe to our latest insights
You can unsubscribe at any time. Read our Privacy Policy.