
TRM Labs Triage: how do we use it to identify a QR code, receipt, or partial address from a photo during an investigation?
Quick Answer: TRM Labs Triage lets you quickly turn “found” artifacts from the real world—QR codes, printed receipts, screenshots, or even partial addresses—into concrete on‑chain leads. By uploading or capturing the image inside Triage, the tool extracts wallet addresses and transaction identifiers, checks them against TRM’s blockchain intelligence, and gives you an immediate read on whether you’re looking at exposure to scams, hacks, sanctions evasion, or other high‑risk activity.
Why This Matters
In the field, investigators rarely start with a clean wallet address neatly pasted into a case file. You start with a phone seized during a search warrant, a crumpled exchange receipt, a screenshot in a chat app, or a QR code on a victim’s email. The speed at which you can go from that artifact to a traceable on‑chain starting point often determines whether you can follow the money before it moves again.
TRM Labs Triage is designed for that first mile of the investigation. It helps law enforcement, compliance teams, and fraud units ingest messy, real‑world artifacts and turn them into actionable blockchain leads in seconds—not hours. Instead of manually re‑typing characters from a blurry photo or hunting through blockchain explorers, you can screen, validate, and prioritize what matters, then hand off the strongest leads into your full TRM investigations workflow.
Key Benefits:
- Faster lead generation from physical and digital evidence: Move from QR code or receipt to a usable wallet or transaction in a few clicks, shrinking the time from seizure to first on‑chain hit.
- Higher confidence in what you’re tracing: Reduce transcription errors and false starts by using machine extraction and TRM’s attribution, rather than manually re‑keying long alphanumeric strings.
- Seamless handoff into deeper investigations: Push the addresses and transactions you uncover into TRM’s investigations and monitoring tools to trace funds across 190 blockchains and 1.9 billion assets.
Core Concepts & Key Points
| Concept | Definition | Why it's important |
|---|---|---|
| TRM Labs Triage | A rapid assessment and evidence‑ingest workflow that converts real‑world artifacts (photos, screenshots, receipts) into on‑chain leads using TRM’s blockchain intelligence. | It bridges the gap between field evidence and full analytics, letting you move from “found object” to actionable wallet or transaction in seconds. |
| Artifact-to-Address Extraction | The process of identifying and extracting wallet addresses, QR‑encoded payment data, or transaction identifiers from images or partial strings. | This is how you turn a QR code, printed receipt, or partial address into a precise starting point for tracing funds. |
| Risk & Exposure Screening | Checking extracted addresses and transactions against TRM’s intelligence, risk categories, and historic exposure across 190 blockchains. | It lets you immediately see whether the artifact is linked to scams, hacks, sanctions, terrorism financing, or other FATF‑aligned predicate offenses. |
How It Works (Step-by-Step)
At a high level, you use TRM Labs Triage to ingest the artifact, extract the underlying crypto data, quickly screen it against TRM’s insights, and then escalate promising leads into a full investigation.
-
Collect and prepare the artifact
Start with whatever you have:
- A QR code from a victim’s phishing email or a suspect’s phone.
- A printed or PDF receipt from an exchange kiosk or OTC broker.
- A screenshot from a messaging app, DeFi interface, or social media.
- A partial address copied from a chat, contract, or log file.
Best practice is to preserve chain of custody and metadata consistent with your agency or institution’s procedures—photographing devices in situ, noting time, location, and seizing officer or analyst.
-
Upload or capture the image in TRM Labs Triage
Once you’re ready to move from evidence to analysis:
- Sign in to TRM Labs and navigate to your Triage workflow.
- Upload the image (photo, screenshot, scan) or use an integrated capture flow if you’re working from a field device.
- Confirm basic context: case identifier, source (e.g., “victim device,” “search warrant,” “KYC file”), and any notes about how the artifact was obtained.
Triage will then process the image to locate and decode crypto‑relevant content embedded in the QR or visible on the page.
-
Extract and interpret the crypto data
Depending on the artifact, Triage can surface different kinds of leads:
- QR code containing a wallet address:
Triage decodes the QR, extracts the full address string, and identifies the likely blockchain or token standard (e.g., a TRON address versus an Ethereum address). - QR code encoding a payment request:
Many payment QR codes embed not just the address, but also amount and sometimes a memo. Triage pulls out the address and relevant parameters so you can see what the suspect or scammer asked the victim to send. - Printed or on‑screen receipt:
Triage looks for:- Deposit or withdrawal wallet addresses.
- Transaction IDs (TXIDs) and timestamps.
- Exchange or kiosk identifiers that can support a production order or MLAT.
- Partial address from the image or text:
If the artifact shows only part of an address (e.g., first and last characters), Triage helps you:- Extract whatever is legible.
- Narrow down potential matches based on chain, counterparty, and context.
- Cross‑reference with any other addresses or TXIDs that appear in the artifact or related case file.
The result is a set of candidate wallets and transactions you can immediately screen.
- QR code containing a wallet address:
-
Screen addresses and transactions using TRM intelligence
For each extracted address or transaction, Triage leverages TRM’s blockchain intelligence:
- Attribution and clustering:
See whether the address is attributed to:- A centralized exchange, OTC desk, or payment processor.
- A mixer, bridge, DeFi protocol, or other service.
- A known scam, ransomware wallet, darknet market, or other illicit cluster.
- Risk categories:
Understand exposure across 150+ risk indicators aligned to FATF predicate offenses and financial crime typologies, such as:- Scams and investment fraud.
- Ransomware and extortion.
- Hacks and exploits.
- Sanctions exposure and terrorism financing.
- Child sexual abuse material (CSAM) payments.
- Cross‑chain visibility:
If funds moved through a bridge or cross‑chain swap, Triage connects on‑chain hops across 190 blockchains and 1.9 billion assets, so you’re not blindsided by a jump to a new network.
This gives you an immediate sense of whether the artifact you’re staring at is linked to a low‑risk customer refund—or a high‑priority fraud or national security case.
- Attribution and clustering:
-
Prioritize leads and move into full investigation
From here, you can:
- Label and save the artifact‑derived addresses in your TRM workspace (e.g., “Victim deposit address,” “Suspect QR from device,” “ATM withdrawal TXID”).
- Escalate high‑risk hits directly into TRM’s investigations product:
- Visualize the flow of funds from the QR‑derived wallet across chains.
- Identify choke points (centralized exchanges, mixers, bridges) for subpoenas, seizures, or freezing orders.
- Build a coherent evidentiary trail that can stand up in court or to internal audit and regulatory review.
- For law enforcement, use TRM Deconflict to:
- Screen the wallet against other active cases.
- Avoid operational collision with parallel investigations.
- Coordinate with other agencies or task forces that may have additional intelligence on the same wallet or cluster.
Triage is not the end of the investigation; it’s how you turn a QR code or a scrap of paper into the start of a defensible, cross‑chain case narrative.
Common Mistakes to Avoid
-
Treating the image as “good enough” evidence without extracting the underlying data:
How to avoid it: Always use Triage (or equivalent workflow) to decode QR codes and receipts and pull out the precise wallet addresses and TXIDs. Screenshots alone are harder to operationalize and less resilient under legal scrutiny. -
Assuming the first visible address is the only lead:
How to avoid it: Review the entire artifact in Triage—receipts often include multiple addresses, transaction IDs, or service identifiers. Each can unlock a different investigative path (e.g., production order to an exchange, follow‑up with a kiosk operator, or cross‑border cooperation request). -
Ignoring partial or “incomplete” artifacts because they look unusable:
How to avoid it: Even partial addresses are powerful when you combine them with timestamps, device data, and TRM’s cross‑chain analytics. Put them through Triage, correlate with other case artifacts, and let clustering and attribution help narrow the field.
Real-World Example
A victim reports losing life savings in a romance-investment scam. The only concrete artifact is a screenshot of a QR code the scammer sent inside a messaging app with the instruction: “Scan here to make your investment deposit.” The victim’s bank shows a wire to a crypto exchange but no on‑chain details.
An investigator:
-
Imports the screenshot into TRM Labs Triage.
Triage decodes the QR and extracts a full wallet address on TRON. -
Screens the address with TRM.
The address is attributed to a cluster heavily associated with investment scam activity, with victims reporting similar patterns through platforms like Chainabuse. TRM’s risk categories highlight prior exposure to other fraud cases and cross‑chain movement into a known high‑risk exchange. -
Escalates to a full investigation.
In TRM’s investigation view, the investigator traces funds from the QR‑derived wallet:- Through several cross‑chain swaps into Ethereum and Binance Smart Chain.
- Into accounts at two centralized exchanges subject to the investigator’s jurisdiction.
-
Coordinates action.
- For law enforcement: they use TRM Deconflict to check whether other agencies are working the same scam cluster, then send preservation and production orders to the exchanges.
- For a financial institution: the bank’s fraud team uses the QR‑derived address to create new screening rules, blocking future transfers to that scam cluster and proactively warning other at‑risk customers.
What started as a single screenshot with a QR code becomes a traceable, cross‑chain trail that supports victim restitution, potential asset seizure, and broader disruption of the fraud network.
Pro Tip: When you encounter a QR code or receipt, don’t wait until you have a fully built case file to run it through TRM Labs Triage. Early extraction and screening can surface links to ongoing investigations in TRM Deconflict, letting you plug into existing intelligence instead of starting cold.
Summary
QR codes, printed receipts, and partial addresses are no longer dead ends in crypto investigations; they are starting points—if you can quickly convert them into on‑chain evidence. TRM Labs Triage is built for that job. By decoding images, extracting wallet addresses and transaction data, and instantly screening them against TRM’s cross‑chain intelligence and 150+ risk categories, Triage lets you move from physical or digital artifacts to actionable leads in minutes.
From there, you can trace the flow of funds across 190 blockchains and 1.9 billion assets, identify mixers, bridges, and exchange choke points, and coordinate with peers through TRM Deconflict. In an environment where scams, hacks, and sanctions evasion move at the speed of the blockchain, that first, fast step—from QR code to wallet—is often what makes the difference between watching funds disappear and actually bringing them home.