BountEx
B2B and B2C
An automated vulnerability scanning platform for websites with continuous monitoring and actionable reports.
Private Access OnlyBountEx Labs LLC
We investigate crypto fraud, deliver OSINT insights, and build secure software for compliance, law enforcement, and private sector teams.
Products and SaaS
Four products are in active development. Each one is designed for clarity, verifiability, and real-world investigative workflows.
B2B and B2C
An automated vulnerability scanning platform for websites with continuous monitoring and actionable reports.
Private Access OnlyB2B and B2C
Graph analytics for tracing funds and entities across blockchains, designed as an affordable alternative to Chainalysis Reactor.
Private Access OnlyService
Temporary, verifiable onward travel reservations for immigration and visa requirements, delivered quickly and securely.
Private Access OnlyB2B
Blockchain-linked certificates that let galleries sell and manage ownership of physical art while preserving custody, compliance, and secondary market revenue.
Private Access OnlyCapabilities
We operate across cybersecurity, OSINT, and crypto investigations, supporting private clients, compliance teams, and law enforcement workflows. When needed, we build custom software that turns investigative requirements into reliable systems.
Leadership
We combine investigative rigor with engineering depth, bridging technical evidence and real-world outcomes.

Chief Executive Officer
3+ years at Binance and Kraken in financial investigations, crypto fraud, AML/CTF, and blockchain forensics. Now an OSINT investigator and law enforcement liaison, bridging victims and authorities by tracing transactions, gathering evidence, and supporting case submissions.

Chief Technology Officer
Background in software engineering and cybersecurity, with experience in scalable web platforms, cloud infrastructure, devops, and security research. Skilled in Python, TypeScript, Nuxt, AWS, Docker, and Linux, with expertise in OSINT, digital forensics, crypto fraud analysis, reverse engineering, red teaming, and security-focused infrastructure design.
Contact
Tell us about your investigation, compliance need, or software roadmap. We will respond quickly and discretely.
Contact us