Your wallet is talking. We show you what it's saying.
Advanced privacy analysis for Solana wallets using information theory,
graph analysis, and blockchain forensics from academic research.
Live Demo · CLI Tool · API Docs
Every Solana transaction is permanently recorded on a public ledger. While addresses appear anonymous, patterns in your transactions can reveal:
| What's Exposed | How It's Detected |
|---|---|
| Your real identity | Exchange KYC correlation |
| Net worth & holdings | Token balance analysis |
| Geographic location | Transaction timing patterns |
| Social connections | Counterparty graph analysis |
| Trading strategies | Behavioral fingerprinting |
Most users have no idea how exposed they are.
SolPrivacy uses the same techniques employed by Chainalysis, Elliptic, and academic researchers to analyze your wallet's privacy posture.
┌─────────────────────────────────────────────────────────────┐
│ CRITICAL │ HIGH │ MODERATE │ LOW │ MINIMAL │
│ 0-20 │ 21-40 │ 41-60 │ 61-80 │ 81-100 │
└─────────────────────────────────────────────────────────────┘
| Attack Vector | Description |
|---|---|
| Temporal Fingerprinting | Infer timezone from transaction timing |
| Dust Attack Tracking | Detect malicious micro-deposits |
| Graph Topology | Cluster wallets via network analysis |
| Exchange Correlation | Match to KYC'd exchange accounts |
| Amount Heuristics | Identify patterns in transaction amounts |
| Metric | What It Measures |
|---|---|
| Shannon Entropy | Transaction randomness/predictability |
| K-Anonymity | How many wallets share your fingerprint |
| Clustering Coefficient | Network interconnectedness |
| Differential Privacy (ε) | Privacy guarantees against inference |
npm install -g solprivacysolprivacyThe CLI includes an AI-powered agent that can:
- Analyze wallets with natural language queries
- Simulate attacks on your wallet
- Compare privacy between wallets
- Generate detailed reports
Visit solprivacy.xyz and paste any Solana wallet address.
git clone https://github.com/Pavelevich/shadow-tracker.git
cd shadow-tracker
npm install
npm run dev- Overall score with letter grade (A-F)
- Risk level classification
- Before/after improvement projections
- Probability of de-anonymization per attack type
- Estimated time for adversary identification
- Specific vulnerability breakdown
- K-anonymity value
- Quasi-identifiers analysis
- Graph topology statistics
- Personalized privacy tool suggestions
- Direct integration with Light Protocol, Arcium
- Projected score improvements
GET https://solprivacy.xyz/api/v3/analyze/:walletAddress
Response:
{
"success": true,
"data": {
"address": "...",
"advancedPrivacyScore": 42,
"grade": "D",
"riskLevel": "HIGH",
"entropy": {
"totalEntropy": 0.73,
"amountEntropy": 0.65,
"temporalEntropy": 0.81
},
"kAnonymity": {
"kValue": 12,
"quasiIdentifiers": ["timing", "amounts"]
},
"attackSimulation": {
"temporalAttack": { "probability": 0.78 },
"graphAttack": { "probability": 0.45 }
},
"recommendations": [...]
}
}| Layer | Technology |
|---|---|
| Frontend | React 18, TypeScript, Vite |
| Styling | TailwindCSS, Framer Motion |
| Components | shadcn/ui |
| Backend | Express.js, Node.js |
| Blockchain | Helius Enhanced API |
| Hosting | Digital Ocean |
Our methodology is grounded in peer-reviewed academic research:
- Meiklejohn et al. (2013) - "A Fistful of Bitcoins" - IMC '13
- Ron & Shamir (2013) - "Quantitative Analysis of Bitcoin Transaction Graph"
- Sweeney (2002) - "k-Anonymity: A Model for Protecting Privacy"
- Narayanan & Shmatikov (2009) - "De-anonymizing Social Networks" - IEEE S&P
- Möser et al. (2018) - "Traceability in the Monero Blockchain" - PoPETs
|
Light Protocol
ZK Compression |
Helius
Enhanced RPC |
Arcium
Confidential MPC |
MIT License - See LICENSE for details.
Built for the Solana ecosystem