ninepointthreeninepointthreeninepointthree

Next gen blockchain intelligence

Let's re-define investigation software together.

55+

Successful interviews

170+

LinkedIn followers

20+

Expert consultations

Business proposal

Emerging tech to tackle a growing problem

Problem

Crypto scams are getting smarter. Last year alone, $9.3 billion dollars were lost, with only approximately 5% recovered. For the crypto fraud investigators fighting on the frontlines, their current, manual blockchain tracing tools are simply not fast enough to find scammer wallets before the stolen assests are lost.

Problem

Crypto scams are getting smarter. Last year alone, $9.3 billion dollars were lost, with only approximately 5% recovered. For the crypto fraud investigators fighting on the frontlines, their current, manual blockchain tracing tools are simply not fast enough to find scammer wallets before the stolen assests are lost.

Problem

Crypto scams are getting smarter. Last year alone, $9.3 billion dollars were lost, with only approximately 5% recovered. For the crypto fraud investigators fighting on the frontlines, their current, manual blockchain tracing tools are simply not fast enough to find scammer wallets before the stolen assests are lost.

Solution

ninepointthree is an on-chain analysis digital platform for crypto investigators that uses AI to automate the manual process of scam wallet tracing and evidence documentation.

Solution

ninepointthree is an on-chain analysis digital platform for crypto investigators that uses AI to automate the manual process of scam wallet tracing and evidence documentation.

Solution

ninepointthree is an on-chain analysis digital platform for crypto investigators that uses AI to automate the manual process of scam wallet tracing and evidence documentation.

Growth

With a market size CAGR of 22%, and a jump of $9.3 billion losses in 2024 to $17 billion losses in 2025, ninepointthree’s problem space is only expanding.

Growth

With a market size CAGR of 22%, and a jump of $9.3 billion losses in 2024 to $17 billion losses in 2025, ninepointthree’s problem space is only expanding.

Growth

With a market size CAGR of 22%, and a jump of $9.3 billion losses in 2024 to $17 billion losses in 2025, ninepointthree’s problem space is only expanding.

Market opportunity

PAM

$11.9 B

Global financial losses due to crypto scams

TAM

$2.90 B

Global crypto compliance and analytics market

SAM

$2.37 B

US crypto investigation market

SOM

$119 M

US Market size for ninepointthree

Long-term market share

$119 M, CAGR: 22%

Competitor landscape

ninepointthree

ninepointthree

Product

Accessible to small/medium firms

Pricing flexibility

Data visibility and smart UI

AI evidence generation

Learning curve

High

High

High

High

Low

AI-powered automatic tracing

Cross-chain tracing

Free trial

Limited

Demixing

Case monitoring with alerts

Variety of background tracing alert types

Chains available

335+

100+

15

10+

20+

Company

Number of employees

750

200

<20

<20

N/A

Market share

36.3%

24.3%

<4.6%

<4.6%

N/A

Established year

2018

2013

2018

2021

2025

Location of HQ

USA

UK

Singapore

Austria

USA

Business roadmap

Servicing location

Servicing location

Key acquisition activities

Key acquisition activities

Additional employees

Additional employees

Seed (3 Months)
Jul 2026 - Sept 2026

San Francisco & NY, USA

+ International conference attendance
+ Working with sponsor users
+ Targeted online adverts

0

Early stage (1 Year)
Oct 2026 - Sept 2027

USA

International conference attendance
Working with sponsor users
+ Influential voice partnerships
Targeted online adverts

0

Accessing bigger players (1 Year)
Oct 2027 - Sept 2028

USA
Europe

International conference attendance
Influential voice partnerships
+ Large law firm partnerships
Targeted online adverts

International conference attendance
Influential voice partnerships
+ Large law firm partnerships

Targeted online adverts

1 direct B2B salesperson

Growth stage (1 Year+)
Oct 2028+

USA
Europe
Singapore

International conference attendance
Influential voice partnerships
Large law firm partnerships
Targeted online adverts

2 direct B2B salespeople

Financial projections

Below are details of ninepointthree's 5-yr financial projections and funding strategies for sustainable cash flow. Many of the business's de-risking activities shown on this page informed the calculation assumptions made.

Why launch in the US?

Number of direct ninepointthree users is ~10x greater (as of 2026)

Larger number of blockchain tech conferences enabling rapid customer reach

High-value accelerators and grants focused on funding blockchain innovation that we are looking to apply for

Legal system is more amenable to AI automation in evidence generation

Few independent crypto investigators (mainly exist as part of large law firms)

Limited number of conferences at the scale we need for effective customer acquisition

Blockchain & tech innovation grants are not high-value enough for our cash flow projections

Legal system not yet open to AI integration

Experiments

Validated across our four key risks

Desirability

Reachability

Feasibility

Admissibility

Desirability

Reachability

Feasibility

Admissibility

Desirability

Reachability

Feasibility

Admissibility

User - Desirability

Are users willing to pay for our product?

Assumption | Experiment | Key takeaway | Next steps

Assumption 1
Do users value our features?

Experiment: Expert interview & concept testing

We conducted one-hour deep-dive sessions with five direct customers to evaluate our core features, identify the most valuable features and identify potential improvements. Feedback was integrated into the high-fidelity prototype. We validated this prototype through a final round of in-person and remote interviews with seven additional users.

Slides used for concept testing

Cameron Stark
Power user Blockchain Investigator

Ralph Dahm
Power user Blockchain Investigator

Abubakar Maruf
Casual user
Fraud & Monitoring Analyst

Basil Manoussos
Power user Forensic Scientist

Aleks Rings
Casual user
Forensic Accountant

Feature prioritization: Which one is the most valuable?

After presentation of each key features, here are what customers say about our product.

4

Background Tracing & Notification

Existing solution, can be improved

"It's a good feature, but ETA scan might already be doing this. It could be improved by adding SMS or email alerts that notify you whenever funds are moved out of a monitored wallet."

3

Evidence Bundle Generation

Valuable add-on, reducing workload

"If that can somehow be turned into a big transaction table in the click of a button, that would save me 8 hours per report. That would be huge."

2

Automatic Multipath Tracing

More channels, stronger connections

Reach your audience everywhere with seamless multichannel engagement tailored for growth.

1

Algorithmic Lead Prioritization

Most valuable, must have

"In terms of aiding the actual tracing process through database built on algorithm built on huge sort of data sets is is really, really useful."

Feature requirements: What would make it valuable to you?

For each feature, we drafted a list of requirements based on user feedback, which were prioritized via an effort to impact matrix. The next section showcases how we integrated the feedback.

A fast black sports car races down the highway.

Users want a clear presentation to see everything mapped out on the UI including the transactions, the clusters, wallets.

The multipath tracing needs to give options to the selection logics like FIFO (first in first out), LIFO (last in first out) to users for them to select the attributions.

A fast black sports car races down the highway.
A person stands in a sandstone cave.
closed window
An orange cube-shaped side table is shown.

Key takeaway

The features most valued by users were priotized for development. New features and improvements were introduced based on requests.

Key takeaway

The features most valued by users were priotized for development. New features and improvements were introduced based on requests.

Key takeaway

The features most valued by users were priotized for development. New features and improvements were introduced based on requests.

Assumption 2
How much are users willing to pay?

Experiment: Van Westendorp pricing interviews

We conducted Van Westendorp method with five potential users across the UK and the US to identify the optimal price point of our platform.

Potential Price Range

Too cheap to be true

Still a good deal

Somewhat expensive

Way too expensive

“You wouldn't want to pay less than a grand for it because we know these software are expensive.”

“You start looking at $1,600 a month for a good price.”

“It's starting to get expensive when you go over $2,000 a month. ”

“Even if it's very expensive software, usually you can try and make it work But there is no way I would go over $4,500 a month. ”

Julie Anne Vos
Crypto Fraud Investigator & Consultant

Chioma Onyekelu
Crypto Compliance & AML Specialist

Andrii Skvortsov
Crypto & Financial Investigator

Julie Cho
Blockchain Investigator

Key takeaway

We validated a three-tier annual pricing model: a $12k Standard entry point, a $15k Premium tier, and an Enterprise offering starting at $16k+. To address user requests for flexibility, we introduced one off paid for add-ons. This allows entry-level users to access specific advanced tools for atypical use cases without committing to a full upgrade.

Key takeaway

We validated a three-tier annual pricing model: a $12k Standard entry point, a $15k Premium tier, and an Enterprise offering starting at $16k+. To address user requests for flexibility, we introduced one off paid for add-ons. This allows entry-level users to access specific advanced tools for atypical use cases without committing to a full upgrade.

Key takeaway

We validated a three-tier annual pricing model: a $12k Standard entry point, a $15k Premium tier, and an Enterprise offering starting at $16k+. To address user requests for flexibility, we introduced one off paid for add-ons. This allows entry-level users to access specific advanced tools for atypical use cases without committing to a full upgrade.

Next steps

We will continue to work with our sponsor users to improve our product and implement the tiered pricing model, including the introduction of on-demand access to premium features for users with high or variable case loads. With the pricing and features defined, we want to understand how to sell it to our potential customers.

GTM - Reachability

Can we acquire the customers and partners needed to access our obtainable market?

Assumption | Experiment | Key takeaway | Next steps

Assumption 1
Are we able to make a significant impression in traditional B2B advertising channels to reach our targeted customer base?

Experiment: LinkedIn traction

We launched the official ninepointthree LinkedIn business page, and then tracked organic reach (impressions), follower growth, and conducted a statistical demographic audit of the professionals engaging with our brand.

1161+

1161+

1161+

organic impressions from initial contents

170+

170+

170+

increase in targeted followers in two weeks

5+

5+

5+

leads obtained from potential partners for sponsorship

Key takeaway

Demographic analytics proved we captured our exact SOM (including Ex-FBI/CIA Investigators and Certified AML Officers), without spending any marketing budget. Our future sponsor partners come from across our target user group, including a 16-year veteran law enforcement and a financial crime investigator who proactively reached out to advise our team and test the platform.

Key takeaway

Demographic analytics proved we captured our exact SOM (including Ex-FBI/CIA Investigators and Certified AML Officers), without spending any marketing budget. Our future sponsor partners come from across our target user group, including a 16-year veteran law enforcement and a financial crime investigator who proactively reached out to advise our team and test the platform.

Key takeaway

Demographic analytics proved we captured our exact SOM (including Ex-FBI/CIA Investigators and Certified AML Officers), without spending any marketing budget. Our future sponsor partners come from across our target user group, including a 16-year veteran law enforcement and a financial crime investigator who proactively reached out to advise our team and test the platform.

Assumption 2
Will influential voices, customers and partners in the US (and international) space validate and advertise our product organically?

Experiment: Influential voices

We conducted targeted outreach and in depth interviews with two industry influential voices to test if they would promote our tool in exchange for free access.

“I could promote it highly and get other people to come to you. Acting as your sales marketing rep in the US.”

—— Ralph Dahm
Blockchain Investigator with a proprietary network of 35,000+ compliance professionals, frequently featured on major news networks.

"The process is simple, I collect the best research tools for crypto and distribute them directly through my repo.”

—— Asharib Ali
Creator of the Curated List of Crypto Research Tools (the 2nd most-starred GitHub repository globally for blockchain intelligence), with an engaged audience of 1.4k developers on GitHub and 13,600+ on LinkedIn.

Key takeaway

Our distribution strategy of a barter model was confirmed by potential partners. Influential investigators confirmed that they will promote our producs in exchange for complimentary platform access. Direct communication with open-source aggregators confirmed their distribution list is purely merit-based.

Key takeaway

Our distribution strategy of a barter model was confirmed by potential partners. Influential investigators confirmed that they will promote our producs in exchange for complimentary platform access. Direct communication with open-source aggregators confirmed their distribution list is purely merit-based.

Key takeaway

Our distribution strategy of a barter model was confirmed by potential partners. Influential investigators confirmed that they will promote our producs in exchange for complimentary platform access. Direct communication with open-source aggregators confirmed their distribution list is purely merit-based.

Assumption 3
Are large-scale industry showcasing and networking events are a feasible customer acquisition channel for ninepointthree?

Experiment: In-person conference attendance

We attended the FutureTech Expo 2026, and used this to network with potential customers, compliance partners, and investors, and demonstrated our demo live. We tested the mechanics, costs, and conversion rates of B2B software sales in this cybersecurity space.

Key takeaway

We successfully engaged with target customers and were able to showcase our demo directly to 50% of the leads we interacted with. Of the relevant users we pitched and demoed the product, 2 in 5 committed to registering their interest and subscribing once the MVP is live. While conference attendance is an inherently expensive acquisition channel, we concurrently utilized the expo floor to interact with potential development, investment, and legal partners. This proved that in this specific industry, offline events deliver exponential ROI that extends far beyond pure customer acquisition.

Key takeaway

We successfully engaged with target customers and were able to showcase our demo directly to 50% of the leads we interacted with. Of the relevant users we pitched and demoed the product, 2 in 5 committed to registering their interest and subscribing once the MVP is live. While conference attendance is an inherently expensive acquisition channel, we concurrently utilized the expo floor to interact with potential development, investment, and legal partners. This proved that in this specific industry, offline events deliver exponential ROI that extends far beyond pure customer acquisition.

Key takeaway

We successfully engaged with target customers and were able to showcase our demo directly to 50% of the leads we interacted with. Of the relevant users we pitched and demoed the product, 2 in 5 committed to registering their interest and subscribing once the MVP is live. While conference attendance is an inherently expensive acquisition channel, we concurrently utilized the expo floor to interact with potential development, investment, and legal partners. This proved that in this specific industry, offline events deliver exponential ROI that extends far beyond pure customer acquisition.

Next steps

Continued advertising work on Linkedin and other B2B communication platforms, and continued attendance at large-scale industry conferences. We engaged Key Opinion Leaders (KOLs) as sponsor users by offering access to our closed beta. These experts will safely pressure-test our AI workflows. These collaborations will provide high-trust case studies that will serve as content for our marketing strategy. Now we validated the market potential, our next step is to ensure that the product is feasible.

Technology - Feasibility

Can we build ninepointthree?

Assumption | Experiment | Key takeaway | Next steps

Steps for on-chain forensic investigations

Within our software architecture, the following steps constitute the core of our investigation algorithm, and each is evaluated below.

Assumption 1
Can we get access to on-chain transaction data?

Experiment: Interview with blockchain researcher

"Public blockchains (like Bitcoin and Ethereum) are indeed designed with ledger transparency as a core feature. Transaction data on these chains is publicly viewable, and it is possible to extract data from transactions, retrieve address histories, and analyze transaction flows."

—— Aida Manzano Kharman
Blockchain researcher @ Imperial College London

Key takeaway

The interview confirmed that we could access on-chain transaction data through third-party providers. At a later stage, we will host our own proprietary nodes to eliminate rate-limiting, minimize latency, and support the high-performance on-chain indexing required for in-depth analysis and clustering.

Key takeaway

The interview confirmed that we could access on-chain transaction data through third-party providers. At a later stage, we will host our own proprietary nodes to eliminate rate-limiting, minimize latency, and support the high-performance on-chain indexing required for in-depth analysis and clustering.

Key takeaway

The interview confirmed that we could access on-chain transaction data through third-party providers. At a later stage, we will host our own proprietary nodes to eliminate rate-limiting, minimize latency, and support the high-performance on-chain indexing required for in-depth analysis and clustering.

Assumption 2
Can we track assets across blockchains?

Experiment: Interview with blockchain data engineer

We interviewed an engineer from a competitor companies Iknaio. Our conversation centred on understanding their cross-chain architecture and how they distinguish their capabilities.

"There is no exact way. Each company maintains its own approach to reverse-engineering these protocols. "

—— Michael Fröwis
Head of engineering @ Iknaio

Key takeaway

While cross-chain tracking is feasible, implementing it would require specialized expertise and the recruitment of a dedicated software engineer.

Key takeaway

While cross-chain tracking is feasible, implementing it would require specialized expertise and the recruitment of a dedicated software engineer.

Key takeaway

While cross-chain tracking is feasible, implementing it would require specialized expertise and the recruitment of a dedicated software engineer.

Assumption 3
Is it possible to trace transactions through a mixer?

Experiment: Desk research analysis

We synthesized current academic research and forensic case studies on mixing protocols to examine whether we can integrate demixing methodologies into our tool.

“We could identify the relationships between the input and output addresses (successfully demix) with 99.14% accuracy.”

—— Y. Hong, H. Kwon, J. Lee, and J. Hur, "A practical de-mixing algorithm for Bitcoin mixing services," in Proc. ACM Asia Conf. Comput. Commun. Secur. (AsiaCCS), 2018

"Although mixers can be very effective for money laundering and it is difficult to demix, there are certain human mistakes which can reveal parts of their transaction history."

—— Elliptic, "The Harmony Horizon Bridge Hack: Following the funds," Elliptic Connect, Jun. 24, 2022. [Online].

Key takeaway

While de-mixing remains an evolving industry challenges, established protocols are well-documented. We will implement existing popular protocols. Later, we will hire expert analysts to investigate novel mixing patterns, which will be integrated into our core AI engine to improve our de-mixing model.

Key takeaway

While de-mixing remains an evolving industry challenges, established protocols are well-documented. We will implement existing popular protocols. Later, we will hire expert analysts to investigate novel mixing patterns, which will be integrated into our core AI engine to improve our de-mixing model.

Key takeaway

While de-mixing remains an evolving industry challenges, established protocols are well-documented. We will implement existing popular protocols. Later, we will hire expert analysts to investigate novel mixing patterns, which will be integrated into our core AI engine to improve our de-mixing model.

Assumption 4
Can we successfully correlate on-chain data to create a risk-scoring model for suspicious wallets?

Experiment: Interview with cryptocurrency analyst

Through technical consultations with industry experts, including a blockchain analyst and a lead blockchain engineer, we have evaluated specialized data providers to add a digital caller id to crypto accounts. This allows our tool to identify if an account is linked to suspicious activity.

We've been in the space since the early days, building our edge through extensive attribution data, private sources, and in-house cross-chain linking tools. These come from on-chain heuristics, paid providers, two-way exchange partnerships, and law-enforcement annotations."

Andy Chua

Cryptocurrency Intelligence Analyst @ Elliptic

Key takeaway

We can use identity tags from partners like MetaSleuth (with 15+ blockchain networks supported) to help us prioritize high-risk accounts and increase the success rate of automatic tracing. In the long term, we plan to host our own database of blockchain records.

Key takeaway

We can use identity tags from partners like MetaSleuth (with 15+ blockchain networks supported) to help us prioritize high-risk accounts and increase the success rate of automatic tracing. In the long term, we plan to host our own database of blockchain records.

Key takeaway

We can use identity tags from partners like MetaSleuth (with 15+ blockchain networks supported) to help us prioritize high-risk accounts and increase the success rate of automatic tracing. In the long term, we plan to host our own database of blockchain records.

Next steps

We will replicate researched methods that achieved 99% accuracy in linking hidden transactions. We will run a proof-of-concept using MetaSleuth's address label API and risk score API against known case addresses to measure entity label accuracy, and compare it against competing providers (Chainalysis, Elliptic, TRM Labs). We will fine tune our model until we can obtain a clear edge.

Newsletter

Newsletter

Sign up

Sign up

Risk assessment

Identifying our four key risks

Through the series of experiments, we have successfully de-risked the most critical assumption, ensuring our product is valuable to users, feasible to build, and legally compliant, and our stakeholders are reachable. To ensure total transparency and ongoing operational resilience, we maintain a database risk register tracking all remaining secondary and long-term risks.

Product roadmap

The 30-month horizon

To refine our product roadmap, ninepointthree consulted with the Imperial Enterprise Lab and examined industry standards to estimated the number of employees needed in different departments. We leveraged their 'Expert in Residence' program, participating in an Idea Surgery and working with a Business Coach to accelerate our development.

“Regulatory expertise is needed, you need to bring in legal and regulatory experts, potentially as contract hires, to make sure your evidence is actually usable in court.”

—— Imperial Enterprise Lab

“It took us two years with full-time developers to bring the initial open-source framework to production level. However, with LLMs, I believe this timeline will be significantly shorter, and prototyping even more so.”

“When hiring, we would not specify the candidate to have specific crypto knowledge, although computer science knowledge is essential.”

—— Michael Fröwis
Head of engineering @ Iknaio

Brand asset design to support competitive positioning

Our website, video and associated platforms (e.g. LinkedIn page) are intentionally designed to express our brand identity: an innovative newcomer ready to challenge and reshape a rapidly growing industry. The visual language and tone are both credible and forward-thinking, appealing directly to investigators seeking better tools as well as partners looking for high-potential opportunities. As we are targeting the US market, all our communications have been written in American English.

Special thanks to…

our community of sponsor users, experts and advisory partners for their continued support of ninepointthree’s mission.

Assumption 1 (High Risk)

Can we get access to on-chain transaction data?

Start your journey

Crypto scams are only getting smarter…
The tools fighting them should too.

Register your interest to be the first to know about new releases.

info@ninepointthree.com

All rights reserved, ©2026

Start your journey

Crypto scams are only getting smarter…
The tools fighting them should too.

Register your interest to be the first to know about new releases.

info@ninepointthree.com

All rights reserved, ©2026

Start your journey

Crypto scams are only getting smarter…
The tools fighting them should too.

Register your interest to be the first to know about new releases.

info@ninepointthree.com

All rights reserved, ©2026