Skip to main content

Documentation Index

Fetch the complete documentation index at: https://doc.extractor.live/llms.txt

Use this file to discover all available pages before exploring further.

Hacken Extractor organizes monitoring into four specialized layers. Each targets a different risk surface — from on-chain attack detection to regulatory compliance and financial health.

Security Monitoring

Real-time detection of on-chain threats — AML flags, address poisoning, block anomalies, and asset flow tracking. Built for security teams responding to active incidents.

Advanced Monitoring

Custom triggers that fire on specific contract events — ERC-20 transfers above a threshold, function calls, blacklisted callers, and more. Built for teams with precise monitoring needs.

Compliance Monitoring

Tracks price feeds, token supply, TVL, DNS records, and GitHub activity. Surfaces deviations that may indicate regulatory exposure or protocol integrity issues.

Financial Monitoring

Monitors balances, circulation supply, multisig state, and token flows. Designed for treasury teams and protocols that need continuous financial health visibility.

How they work together

1

Security Monitoring catches threats first

Detectors run continuously against every block and transaction, flagging known bad actors, anomalous blocks, and suspicious fund flows in real time.
2

Advanced Monitoring covers custom logic

Where built-in detectors don’t fit, triggers let you define your own conditions — any function call, event, transfer pattern, or caller restriction.
3

Compliance and Financial Monitoring track health over time

Scheduled checks evaluate price deviations, supply changes, balance thresholds, and external data sources on a configurable cadence.
4

Alerts route to your team

All monitoring types emit structured alerts with severity levels and full transaction context, delivered to your configured notification channels.