Hacken Extractor organizes monitoring into four specialized layers. Each targets a different risk surface — from on-chain attack detection to regulatory compliance and financial health.Documentation Index
Fetch the complete documentation index at: https://docs.extractor.live/llms.txt
Use this file to discover all available pages before exploring further.
Security Monitoring
Real-time detection of on-chain threats — AML flags, address poisoning, block anomalies, and asset flow tracking. Built for security teams responding to active incidents.
Advanced Monitoring
Custom triggers that fire on specific contract events — ERC-20 transfers above a threshold, function calls, blacklisted callers, and more. Built for teams with precise monitoring needs.
Compliance Monitoring
Tracks price feeds, token supply, TVL, DNS records, and GitHub activity. Surfaces deviations that may indicate regulatory exposure or protocol integrity issues.
Financial Monitoring
Monitors balances, circulation supply, multisig state, and token flows. Designed for treasury teams and protocols that need continuous financial health visibility.
How they work together
Security Monitoring catches threats first
Detectors run continuously against every block and transaction, flagging known bad actors, anomalous blocks, and suspicious fund flows in real time.
Advanced Monitoring covers custom logic
Where built-in detectors don’t fit, triggers let you define your own conditions — any function call, event, transfer pattern, or caller restriction.
Compliance and Financial Monitoring track health over time
Scheduled checks evaluate price deviations, supply changes, balance thresholds, and external data sources on a configurable cadence.