Chainalysis
Edit

Chainalysis

https://chainalysis.com/
Last activity: 10.09.2025
Active
Categories: AnalyticsBlockchainBusinessCryptoDataEconomyFinTechGovTechPlatformSoftware
Chainalysis offers cryptocurrency investigation and compliance solutions to global law enforcement agencies, regulators, and businesses as they work together to fight illicit cryptocurrency activity. Backed by Benchmark and other leading names in venture capital, Chainalysis builds trust in blockchains.  For more information, visit: www.chainalysis.com
Followers
26.02K
Website visits
236.6K /mo.
Mentions
912
Location: United States, New York
Employees: 501-1000
Total raised: $996.1M
Valuation: $8.6B
Founded date: 2014

Investors 17

Show more

Funding Rounds 10

DateSeriesAmountInvestors
29.07.2024-$16.5M-
29.08.2022-$30M-
24.05.2022Series F$400M-
29.06.2021Series E$100MCoatue
26.03.2021Series D$100M-
04.12.2020Series C$100M-
09.07.2020Series B$190M-
12.02.2019Series B$30M-
05.04.2018Series A$16M-
19.02.2016Seed$1.6M-

Mentions in press and media 912

DateTitleDescription
10.09.2025The NFT Hangover: What Went Wrong and How to Keep What’s Left SafeShare Share Share Share Email By the first half of 2025, total NFT sales tallied about $2.8 billion, a fraction of 2021’s mania. Even that headline masks a harsher reality: dollar trading volumes keep falling as the number of cheap sales ri...
09.09.2025Seoul Police Dismantle Global Hacking Network with Chainalysis Support Amid Rising Crypto CrimeThe Seoul Metropolitan Police Agency recently dismantled an international hacking ring responsible for stealing millions in cryptocurrency, leveraging advanced blockchain analytics from Chainalysis. This operation marks a critical step in c...
04.09.2025Россия заняла 10-е место в глобальном индексе принятия криптовалютРоссия оказалась на 10-м месте в мировом рейтинге индекса принятия криптовалют, составленном аналитической компанией Chainalysis. Топ-9 выглядит следующим образом: Индия, США, Пакистан, Вьетнам, Бразилия, Нигерия, Индонезия, Украина и Филип...
04.09.2025How North Korean hackers are turning job interviews into crypto heistsNorth Korean hackers are saturating the cryptocurrency industry with credible-sounding job offers as part of their campaign to steal digital cash, according to new research, raw data and interviews. The problem is becoming so common that jo...
29.08.2025EUA sancionam rede de TI da Coreia do Norte infiltrada em empresas globaisProfissionais de TI norte-coreanos se infiltram em empresas globais, diz investigação (imagem: stephan/Flickr) O melhor da tecnologia está no nosso canal no WhatsApp Entre Agora Resumo O Departamento do Tesouro dos EUA sancionou indivíduos ...
28.08.2025Global Crackdowns on Crypto Crime : $47M in Pig Butchering Funds Frozen, OFAC Targets DPRK and Russian Sanctions EvasionCryptocurrency’s rise as a global financial tool has brought both tech advancements and challenges, with illicit actors exploiting its decentralized and permissionless nature. As noted in an update from Chainalysis, recent enforcement actio...
15.08.2025UK Targets Ransomware, Plans Ban on Paying PerpetratorsRecently, the UK government announced plans to tackle rampant ransomware, proposing a solution that bans certain entities from paying the perpetrators. Ransomware costs the UK economy millions of pounds each year due to cyber extortionists....
11.08.2025Africa’s quiet crypto revolutionFor many years, countries across Africa have been quietly leading the race when it comes to the practical adoption of cryptocurrency. From cross-border payments to savings, everyday users on the continent have been putting crypto to real wo...
10.08.2025Bay Miner Launches Mobile Crypto Mining App with Smart Switching Across BTC, XRP, DOGEShare Share Share Share Email The future of crypto mining is here, and it fits right in your pocket. Bay Miner has officially launched the world’s first mobile cloud mining app featuring smart switching across BTC, XRP, and DOGE—giving user...
28.07.2025AI Turns Panda Image Into ‘New Breed of Persistent Malware’Source: Aqua Security Hackers are embedding AI-generated malware hidden inside seemingly benign panda images to covertly hijack Linux machines for cryptomining, according to Aqua Security. The stealthy code evades antivirus software and lea...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In