Do you know what your Bitcoin transactions reveal?
shows you. It's an on-chain privacy scanner that analyzes addresses and transactions. 🧵
Born to fill the gap left by OXT (http://oxt.me) and KYCP (http://kycp.org). Similar tools that disappeared in 2024.
It works 100% client-side. No backend, no tracking. Paste an address or txid and get a 0-100 score with specific findings. And if you have Umbrel, you can use this app from your node.
The engine implements more than 30 heuristics that evaluate the on-chain privacy of your transactions and addresses. It includes labels for 30 million addresses from more than 650 entities.
What can you analyze?
• A transaction (txid)
• An address
• An entire wallet (xpub/descriptor)
• A PSBT before signing (to evaluate your privacy before broadcasting the transaction)
When you do a search, you get the privacy score, transaction graph with inputs, outputs and deterministic links, and a main recommendation. If you choose Cypherpunk mode you have much more to analyze, such as fingerprints, visual tracking like OXT.
Transaction Entropy is obtained thanks to Boltzmann analysis, which has been adapted to analyze beyond 12-input x 12-output transactions.
What does it detect?
• Round amounts that reveal payment vs change
• Address reuse
• Consolidations that link your UTXOs
• Wallet fingerprints (nLockTime, nVersion, BIP69...)
• Dust attacks
• Peel chains
• Proximity to known entities
It detects the 3 major CoinJoin protocols:
• Whirlpool (5 equal outputs)
• WabiSabi (20+ I/O)
• JoinMarket (maker/taker)
And most importantly: it analyzes your POST-CoinJoin behavior to see if you undid the privacy you just gained.
Not just numbers. Interactive visualizations:
• Sankey flow diagram with Boltzmann overlay
• Link probability heatmap
• OXT-style explorable graph (expand, collapse, trace)
• Coin Join structure...
Languages:
🇬🇧 English (default)
🇪🇸 Spanish
🇵🇹 Portuguese
🇩🇪 German
🇫🇷 French
Networks: Mainnet, Testnet4, Signet
There are many "easter eggs" hidden in the app that will be discovered with use. If you don't know much, use "newbie" mode and if you want to go deeper you have Cypherpunk mode.
Am-I.exposed is in an experimental phase, developing day by day. We hope many users join to develop this open source project. You can propose new features or report bugs at
Research and acknowledgments
The goal is that with this tool:
• You learn to use Bitcoin giving away the minimum possible information to third parties
• You review some errors in your transactions and can fix them
• We make chain observers' assumptions more difficult
The tool can be used by agents. Here are the instructions on how to do it:
Will our wallets have complex algorithms in the future to make our transactions more ambiguous?
Dedicated to the Samourai wallet devs, Keonne and William, currently imprisoned for developing Bitcoin privacy tools. We are eternally grateful for everything learned. This goes to them.
Copexit and Arkad
am-i.exposed
am-i.exposed - Bitcoin Privacy Scanner
Is your Bitcoin traceable? Paste an address or txid - get a privacy score with 33 chain analysis heuristics. Free, client-side, no tracking.
Born to fill the gap left by OXT (http://oxt.me) and KYCP (http://kycp.org). Similar tools that disappeared in 2024.
It works 100% client-side. No backend, no tracking. Paste an address or txid and get a 0-100 score with specific findings. And if you have Umbrel, you can use this app from your node.
The engine implements more than 30 heuristics that evaluate the on-chain privacy of your transactions and addresses. It includes labels for 30 million addresses from more than 650 entities.
What can you analyze?
• A transaction (txid)
• An address
• An entire wallet (xpub/descriptor)
• A PSBT before signing (to evaluate your privacy before broadcasting the transaction)




GitHub
GitHub - Copexit/am-i-exposed: The bitcoin privacy scanner you were afraid to run.
The bitcoin privacy scanner you were afraid to run. - Copexit/am-i-exposed
Research and acknowledgments
The goal is that with this tool:
• You learn to use Bitcoin giving away the minimum possible information to third parties
• You review some errors in your transactions and can fix them
• We make chain observers' assumptions more difficult
The tool can be used by agents. Here are the instructions on how to do it: am-i.exposed
am-i.exposed - Bitcoin Privacy Scanner
Is your Bitcoin traceable? Paste an address or txid - get a privacy score with 33 chain analysis heuristics. Free, client-side, no tracking.
am-i.exposed
Welcome - am-i.exposed | Bitcoin Privacy Scanner
They score your wallet every day. You've never seen the results. A free, open-source Bitcoin privacy scanner.

Por ejemplo, en tu red principal todos los dispositivos conectados enrutan el tráfico a través de Mullvad (Ej. Dinamarca). Si fallara la conexión, enrutarían a través de ProtonVPN (Ej. Portugal). Si fallaran ambas, se produciría una desconexión evitando conectar a tu IP real.
Esto es útil para servidores, nodos, ordenadores que tengas conectados en esa red principal.
Los dispositivos conectados a tu red de invitados podrían enrutar por ProtonVPN hacia otro país (IP en España). Y si se produjera un fallo de conexión enrutarían por tu IP real.
La red de invitados se usa para aumentar la seguridad y la gestión del acceso a internet para personas externas, sin comprometer la red principal. También para dispositivos que se conectan al WiFi y no confías mucho en la info que puedan recopilar.
Si quieres que un dispositivo o varios no conecten con una VPN también lo puedes hacer. Por ejemplo tu TV, ya que quieres acceder a Netflix/Amazon o al servicio que quieras evitando el bloqueo por uso de VPN.
Después de establecer las políticas, puedes elegir la prioridad de cada tunel. Tu router, tus reglas. Además limitarás el tráfico que pueda ver tu proveedor de internet, a la vez que evitas el acceso a tu máquina.


