arkham-leading-crypto-analysis-tools
Arkham research — leading crypto analysis tools (reference)
Educational routing only. This skill does not reproduce the article body or screenshots. Read the live page for the full list, updates, and product details.
Canonical URL
- 12 Leading Crypto Analysis Tools For Traders & Investors — Arkham Intelligence research (Intel / Research section on
info.arkm.com).
Publisher: Arkham Intelligence (commercial on-chain analytics; the article is editorial content describing a broad tool landscape, not blockint methodology).
What the piece is (conceptual)
The article frames three common lenses in crypto markets:
| Lens | One-line idea (non-exhaustive) |
|---|---|
| Fundamental | Token/project fundamentals—usage, economics, team/market context, metrics like TVL or supply schedules where relevant. |
| Technical | Price and volume history—charting, indicators, pattern language (e.g. support/resistance). |
| On-chain | Public ledger activity—flows, holders, entities/labels where tools provide them; unique to crypto vs purely traditional tape analysis. |
It then surveys a set of third-party platforms (charting, market data, explorers, on-chain analytics, etc.). The current roster and descriptions belong on the live article—vendors, features, and rankings change.
How to use with blockint
| Need | Skill |
|---|---|
| Vendor-neutral analytics / AML context | blockchain-analytics-operations |
| BI basics (explorers, tracers, categories) | blockchain-intelligence-fundamentals |
| Tokenomics and on-chain metrics depth | on-chain-research-tokenomics |
| Market-structure vocabulary (non-prescriptive) | crypto-market-structures |
| Solana stack pointers | solana-onchain-intelligence-resources |
| Forensic / ethics-heavy investigation | crypto-investigation-compliance, on-chain-investigator-agent |
Guardrails
- Not investment advice — the article is informational; users owe their own due diligence and risk choices.
- No vendor endorsement — listing a tool is not a blockint recommendation; verify accuracy, coverage, and licensing for your use case.
- Attribution and labels — on-chain entity labels can be wrong or stale; separate fact (chain data) from inference (tags, heuristics).
- Terms & privacy — each platform has its own ToS and data practices.
Goal: a stable pointer to Arkham’s leading crypto analysis tools research URL for tool-discovery and fundamental / technical / on-chain framing, aligned with blockint’s educational posture.
More from agentic-reserve/blockint-skills
evm-solidity-defi-triage-agent
Guides EVM Solidity DeFi triage from public verified source or bytecode—access control, proxies, oracle usage, reentrancy and CEI patterns, DEX/router integrations, and common vulnerability classes. Use when the user asks for Ethereum or L2 smart contract security review, Solidity audit triage, OpenZeppelin proxy risks, or EVM-specific DeFi patterns—not for live exploits or private keys.
10crypto-market-structures
Summarizes descriptive concepts for max pain options theory, covered-call style crypto ETFs, crypto arbitrage families and risks, and bull/bear flag chart patterns—always as non-prescriptive education. Use when the user asks about max pain, premium income ETFs, arbitrage, funding rates, flash loans, or bull/bear flags in crypto trading context.
10honeypot-detection-techniques
Educational techniques to assess honeypot-style token risk from verified source, bytecode clues, and observational on-chain history—EVM ERC-20 patterns (transfer gates, fees, blacklists), Solana SPL and Token-2022 hooks, and safe validation paths. Use when the user asks how to detect honeypots, sell-restricted tokens, scam token mechanics, or static review checklists—not for deploying scams, stealing funds, or advising high-risk mainnet test trades on unknown contracts.
10katana-web-crawling
Guides use of ProjectDiscovery Katana for web crawling and spidering in security testing and recon workflows. Covers installation, standard vs headless mode, scope and rate limits, JSONL output, and piping from httpx or URL lists. Use when the user mentions Katana, projectdiscovery/katana, web crawling, spidering, endpoint discovery, attack surface mapping, or chaining crawlers in automation pipelines.
10solana-defi-vulnerability-analyst-agent
Guides discovery and documentation of Solana DeFi protocol risks from public code and chain state—Anchor/native programs, PDAs, CPIs, oracles, pools, SPL mechanics, and historical tx reconstruction. Use when the user asks for Solana program security review, DeFi vulnerability triage, PDA or CPI safety, oracle or liquidity-pool risk, launchpad/bonding-curve issues, or evidence-backed severity findings without exploits or private keys.
10solana-tracing-specialist
Guides Solana-specific on-chain forensics—ATA resolution, SPL instruction parsing, transaction history via RPC and indexers (e.g. Helius-style APIs), fund-flow graphs, Solana clustering heuristics, and program authority review. Use when the user investigates Solana wallets, SPL tokens, DEX/Jito flows, rug or phishing patterns on Solana, or needs evidence-structured tracing reports with public data only.
10