Back to site
Invite Only.onionv3.9

TeleTrace

Telegram evidence collection and multi-platform OSINT suite. Collect messages, map networks, track coded language, trace financial connections, and build airtight evidence packages for investigations that matter.

"Built for those who refuse to look the other way."

Invite only Live on .onion

Overview

TeleTrace is a full-stack investigative platform built to collect, analyze, and preserve evidence from Telegram and beyond. It started as a Telegram scraper and grew into a multi-platform OSINT suite with 30+ modules spanning collection, analysis, deep investigation, and team collaboration.

It runs as a Tor hidden service, accessible only through Tor Browser. No clearnet exposure, no third-party cloud services, no tracking. All data lives on a secured server. Evidence packages include SHA-256 integrity hashes for chain of custody.

Access is invite-only. If your work involves investigating abuse networks, tracking bad actors on Telegram, or building evidence for law enforcement referrals, reach out.

Collection

API Mode Requires Login

Full message history, sender IDs, replies, forwards, and metadata. Requires a burner Telegram account. Built-in rate limiting and account rotation guidance to minimize detection.

Web Scrape Zero Risk

No login required, no ban risk. Scrapes public channels through the web preview. Limited history depth, channels only. Safe for passive reconnaissance.

Multi-Platform Import Cross-Platform

Import from Discord (DiscordChatExporter JSON), Reddit (JSON), or generic CSV/JSON. All messages merge into a unified database for cross-platform analysis.

Analysis & OSINT

🔍Username Scanner
Scan any username across 25+ platforms including Twitter/X, Instagram, Reddit, TikTok, GitHub, Telegram, and Discord. Link results to suspect profiles.
🌐Web Recon
Paste any URL and scrape it for emails, phone numbers, social handles, Telegram/Discord invites, and crypto wallets. Configurable depth. Tor routing for .onion sites.
🧬Network Map
Interactive visualization of Telegram group connections. Channels, suspects, bridge contacts, and shadow groups mapped by shared invite links and forwards.
🤵Invite Link Hunter
Find paths into private groups. Tracks leaked invite links, identifies shadow groups from forwarded messages, and scores bridge contacts by network risk.
🔤Code Word Engine
Define terms with wildcards or regex, assign categories and severity, scan all messages. Flags coded language with full context, sender, group, and timestamp.
🤖Bot Code Tracker
Auto-detects file distribution bot codes across all messages. Tracks which bot, who shared it, frequency. Export abuse reports for Telegram Trust & Safety.
🏴Dark Web Tracking
Auto-detects .onion addresses across all collected data. Shows who shared each link, in which groups, how many times. Sender correlation analysis.
👥Entity Extractor
Extracts names, organizations, and locations from messages. One-click searches across 13+ public records databases including ICIJ, OCCRP, PACER, and OpenCorporates.

Deep Investigation

💰Payment Trails
Follow the money. Track cryptocurrency addresses, payment references, and financial patterns mentioned across collected messages.
Blockchain Explorer
Look up wallet addresses and trace transaction histories directly from the investigation interface.
🏢Corporate Registry
Search OpenCorporates for shell companies, directorships, and corporate connections. Batch lookup all suspects automatically.
🏧Political Finance
Search FEC, OpenSecrets, Hansard, and charity databases worldwide. Topic investigation mode cross-references political donors against your collected data.
📷Media Evidence
Download, SHA-256 hash, and perceptually fingerprint media from channels. Duplicate detection, LOVCAT cross-referencing, and evidence library management.
📋Sanctions & WHOIS
Check suspects against sanctions lists. WHOIS lookups for domain ownership. Cross-reference with Chinese business networks for international cases.
Python Flask Telethon SQLite Tor / .onion OSINT SHA-256 D3.js

Team & Evidence

TeleTrace supports multi-user collaboration through its Team system. Bastion acts as the team hub. Members can coordinate through an internal forum and messaging system, share investigation notes, and track progress through an activity feed. The Investigations module lets teams organize evidence around specific cases.

All evidence is tamper-evident. Database snapshots can be created, labeled, and archived for preservation. Selective data purges let you clean categories without losing critical records. Evidence integrity is non-negotiable.

Screenshots

Screenshots contain blurred regions to protect active investigation data, suspect identities, and ongoing case information.

TeleTrace login TeleTrace archives TeleTrace media evidence TeleTrace corporate registry TeleTrace political finance TeleTrace code word engine