Logo

How to request an exchange to freeze stolen crypto?

Image title

Can a user contact an exchange directly to freeze stolen assets?

Yes — a user can contact a cryptocurrency exchange directly and request a temporary freeze of stolen assets if they were transferred to a deposit address associated with that platform.
However, it’s important to understand the following:
🟡 An exchange will not freeze assets based solely on a user’s incident description.
The exchange must be able to see that the destination address has already been flagged via a markup — a classification in AML analytics systems that links the address to illicit activity.
If the exchange does not use the AML provider where the markup was created, it simply won’t detect the risk.
That’s why it’s more effective to initiate markup through Match Systems — we maintain integrations with dozens of cryptocurrency exchanges, OTC desks, payment services, blockchain explorers, and analytics platforms. Learn more about markup here.

What should a request to the exchange include?

To ensure that an exchange promptly reacts and freezes stolen assets, it is crucial to craft your request correctly. Your message should include the following details:
  • Exchange contact information
    Each exchange has designated contact points for such requests. You can download a list of contact addresses here:
  • Incident details:
     – Wallet address of the perpetrator
     – Transaction hash
     – Date and time of the transfer (UTC)
  • Brief summary of the incident and a formal request to temporarily freeze the associated funds

Prefer not to handle this on your own?

Our team at Match Systems can contact the exchange on your behalf and provide verified markup data, a structured incident report, and supporting analytics — all of which significantly improve the chances of freezing the stolen funds before withdrawal.
Submit
an application
Leave a request
Specify Telegram username or email - depending on the chosen method of communication.
Approximate amount of damage (in dollars)
Hash of transactions that were stolen (if any)
Text description of the situation (in as much detail as possible)
Known information about the attacker (if any)
Additional materials on the case (correspondence, screenshots, documents, etc.)
Give your contact info
Form submission
Confirm that you are not a robot
or press Enter
Application sent!
Application sent!