Invite Only.onionv3.9
TeleTrace
Telegram evidence collection and multi-platform OSINT suite. Collect messages, map networks, track coded language, trace financial connections, and build airtight evidence packages for investigations that matter.
"Built for those who refuse to look the other way."
Overview
TeleTrace is a full-stack investigative platform built to collect, analyze, and preserve evidence from Telegram and beyond. It started as a Telegram scraper and grew into a multi-platform OSINT suite with 30+ modules spanning collection, analysis, deep investigation, and team collaboration.
It runs as a Tor hidden service, accessible only through Tor Browser. No clearnet exposure, no third-party cloud services, no tracking. All data lives on a secured server. Evidence packages include SHA-256 integrity hashes for chain of custody.
Access is invite-only. If your work involves investigating abuse networks, tracking bad actors on Telegram, or building evidence for law enforcement referrals, reach out.
Collection
Full message history, sender IDs, replies, forwards, and metadata. Requires a burner Telegram account. Built-in rate limiting and account rotation guidance to minimize detection.
No login required, no ban risk. Scrapes public channels through the web preview. Limited history depth, channels only. Safe for passive reconnaissance.
Import from Discord (DiscordChatExporter JSON), Reddit (JSON), or generic CSV/JSON. All messages merge into a unified database for cross-platform analysis.
Analysis & OSINT
Scan any username across 25+ platforms including Twitter/X, Instagram, Reddit, TikTok, GitHub, Telegram, and Discord. Link results to suspect profiles.
Paste any URL and scrape it for emails, phone numbers, social handles, Telegram/Discord invites, and crypto wallets. Configurable depth. Tor routing for .onion sites.
Interactive visualization of Telegram group connections. Channels, suspects, bridge contacts, and shadow groups mapped by shared invite links and forwards.
Find paths into private groups. Tracks leaked invite links, identifies shadow groups from forwarded messages, and scores bridge contacts by network risk.
Define terms with wildcards or regex, assign categories and severity, scan all messages. Flags coded language with full context, sender, group, and timestamp.
Auto-detects file distribution bot codes across all messages. Tracks which bot, who shared it, frequency. Export abuse reports for Telegram Trust & Safety.
Auto-detects .onion addresses across all collected data. Shows who shared each link, in which groups, how many times. Sender correlation analysis.
Extracts names, organizations, and locations from messages. One-click searches across 13+ public records databases including ICIJ, OCCRP, PACER, and OpenCorporates.
Deep Investigation
Follow the money. Track cryptocurrency addresses, payment references, and financial patterns mentioned across collected messages.
Look up wallet addresses and trace transaction histories directly from the investigation interface.
Search OpenCorporates for shell companies, directorships, and corporate connections. Batch lookup all suspects automatically.
Search FEC, OpenSecrets, Hansard, and charity databases worldwide. Topic investigation mode cross-references political donors against your collected data.
Download, SHA-256 hash, and perceptually fingerprint media from channels. Duplicate detection, LOVCAT cross-referencing, and evidence library management.
Check suspects against sanctions lists. WHOIS lookups for domain ownership. Cross-reference with Chinese business networks for international cases.
Python
Flask
Telethon
SQLite
Tor / .onion
OSINT
SHA-256
D3.js
Team & Evidence
TeleTrace supports multi-user collaboration through its Team system. Bastion acts as the team hub. Members can coordinate through an internal forum and messaging system, share investigation notes, and track progress through an activity feed. The Investigations module lets teams organize evidence around specific cases.
All evidence is tamper-evident. Database snapshots can be created, labeled, and archived for preservation. Selective data purges let you clean categories without losing critical records. Evidence integrity is non-negotiable.
Screenshots
Screenshots contain blurred regions to protect active investigation data, suspect identities, and ongoing case information.