{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:56:39Z","timestamp":1768416999927,"version":"3.49.0"},"reference-count":26,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100009886","name":"Regione Puglia","doi-asserted-by":"publisher","award":["THA48Y5"],"award-info":[{"award-number":["THA48Y5"]}],"id":[{"id":"10.13039\/501100009886","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Cryptocurrencies have now become an emerging blockchain-based payment technology; among them, bitcoin is the best known and most widely used. Users on these networks are pseudo-anonymous, meaning that while all transactions from an address are transparent and searchable by anyone, the users\u2019 true identities are not directly revealed; to preserve their privacy, users often use many different addresses. In recent years, some studies have been conducted regarding analyzing clusters of bitcoin addresses that, according to certain heuristics, belong to the same entity. This capability provides law enforcement with valuable information for investigating illegal activities involving cryptocurrencies. Clustering methods that rely on a single heuristic often fail to accurately and comprehensively cluster multiple addresses. This paper proposes Bitcoin Address Clustering based on multiple Heuristics (BACH): a tool that uses three different clustering heuristics to identify clusters of bitcoin addresses, which are displayed through a three-dimensional graph. The results lead to several analyses, including a comparative evaluation of WalletExplorer, which is a similar address clustering tool. BACH introduces the innovative feature of visualizing the internal structure of clusters in a graphical format. The study also shows how the combined use of different heuristics provides better results and more complete clusters than those obtained from their individual use.<\/jats:p>","DOI":"10.3390\/info15100589","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T11:40:27Z","timestamp":1727350827000},"page":"589","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics"],"prefix":"10.3390","volume":"15","author":[{"given":"Michele","family":"Caringella","sequence":"first","affiliation":[{"name":"Italpaghe S.r.l., Viale Paolo Borsellino e Giovanni Falcone, 17, 70125 Bari, Italy"}]},{"given":"Francesco","family":"Violante","sequence":"additional","affiliation":[{"name":"Italpaghe S.r.l., Viale Paolo Borsellino e Giovanni Falcone, 17, 70125 Bari, Italy"}]},{"given":"Francesco","family":"De Lucci","sequence":"additional","affiliation":[{"name":"Italpaghe S.r.l., Viale Paolo Borsellino e Giovanni Falcone, 17, 70125 Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3955-0478","authenticated-orcid":false,"given":"Stefano","family":"Galantucci","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, 70125 Bari, Italy"}]},{"given":"Matteo","family":"Costantini","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, 70125 Bari, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2024,9,26]]},"reference":[{"key":"ref_1","unstructured":"Nakamoto, S. (2024, September 10). Bitcoin: A Peer-to-Peer Electronic Cash System, Available online: https:\/\/www.ussc.gov\/sites\/default\/files\/pdf\/training\/annual-national-training-seminar\/2018\/Emerging_Tech_Bitcoin_Crypto.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Raju, R.S., Gurung, S., and Rai, P. (2022). An overview of 51% attack over Bitcoin network. Contemporary Issues in Communication, Cloud and Big Data Analytics: Proceedings of CCB 2020, Springer.","DOI":"10.1007\/978-981-16-4244-9_4"},{"key":"ref_3","unstructured":"Kaminsky, D. (2024, June 25). Some Thoughts on Bitcoin. Available online: https:\/\/dankaminsky.com\/2011\/08\/05\/bo2k11\/."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1108\/JMLC-07-2017-0031","article-title":"Illicit Bitcoin transactions: Challenges in getting to the who, what, when and where","volume":"21","author":"Irwin","year":"2018","journal-title":"J. Money Laund. Control"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., and Savage, S. (2013, January 23\u201325). A fistful of bitcoins: Characterizing payments among men with no names. Proceedings of the 2013 Internet Measurement Conference, Barcelona, Spain.","DOI":"10.1145\/2504730.2504747"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1049\/blc2.12036","article-title":"Mixing detection on bitcoin transactions using statistical patterns","volume":"3","author":"Shojaeinasab","year":"2023","journal-title":"IET Blockchain"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Hong, Y., Kwon, H., Lee, J., and Hur, J. (2018, January 4). A practical de-mixing algorithm for bitcoin mixing services. Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Incheon, Republic of Korea.","DOI":"10.1145\/3205230.3205234"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2237","DOI":"10.1109\/TSMC.2021.3049278","article-title":"Detecting mixing services via mining bitcoin transaction network with hybrid motifs","volume":"52","author":"Wu","year":"2021","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_9","unstructured":"De Balthasar, T., and Hernandez-Castro, J. (2017, January 8\u201310). An analysis of bitcoin laundry services. Proceedings of the Secure IT Systems: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia. Proceedings 22."},{"key":"ref_10","unstructured":"Kokash, N. (2005). An Introduction to Heuristic Algorithms, Department of Informatics and Telecommunications."},{"key":"ref_11","unstructured":"Kinkeldey, C., Fekete, J.D., and Isenberg, P. (2017, January 12\u201316). Bitconduite: Visualizing and analyzing activity on the bitcoin network. Proceedings of the EuroVis 2017\u2014Eurographics Conference on Visualization, Posters Track, Barcelona, Spain."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/TVCG.2018.2864814","article-title":"Bitextract: Interactive visualization for extracting bitcoin exchange intelligence","volume":"25","author":"Yue","year":"2018","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3135","DOI":"10.1109\/TVCG.2019.2963018","article-title":"Visualization of blockchain data: A systematic review","volume":"27","author":"Tovanich","year":"2019","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"ref_14","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., and Capkun, S. (2013, January 1\u20135). Evaluating user privacy in bitcoin. Proceedings of the Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan. Revised Selected Papers 17."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ermilov, D., Panov, M., and Yanovich, Y. (2017, January 18\u201321). Automatic bitcoin address clustering. Proceedings of the 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico.","DOI":"10.1109\/ICMLA.2017.0-118"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"210582","DOI":"10.1109\/ACCESS.2020.3039570","article-title":"Heuristic-based address clustering in bitcoin","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3737","DOI":"10.1109\/TNSM.2022.3186466","article-title":"Improving Address Clustering in Bitcoin by Proposing Heuristics","volume":"19","author":"Zhao","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-019-9900-9","article-title":"Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering","volume":"63","author":"Zheng","year":"2020","journal-title":"Sci. China Inf. Sci."},{"key":"ref_19","unstructured":"Lewenberg, Y., Bachrach, Y., Sompolinsky, Y., Zohar, A., and Rosenschein, J.S. (2015, January 4\u20138). Bitcoin mining pools: A cooperative game theoretic analysis. Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Turkey."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Reid, F., and Harrigan, M. (2011, January 9\u201311). An Analysis of Anonymity in the Bitcoin System. Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, USA.","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R. (2013). Quantitative Analysis of the Full Bitcoin Transaction Graph. Financial Cryptography and Data Security, Springer.","DOI":"10.1007\/978-3-642-39884-1"},{"key":"ref_22","unstructured":"Christin, N., and Safavi-Naini, R. (2014). BitIodine: Extracting Intelligence from the Bitcoin Network. Financial Cryptography and Data Security, Springer."},{"key":"ref_23","unstructured":"Maxwell, G. (2024, June 25). Coinjoin: Bitcoin Privacy for the Real World. Available online: https:\/\/bitcointalk.org\/?topic=279249."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Gong, Y., Chow, K.P., Ting, H.F., and Yiu, S.M. (2022, January 3\u20135). Analyzing the error rates of bitcoin clustering heuristics. Proceedings of the IFIP International Conference on Digital Forensics, Virtual.","DOI":"10.1007\/978-3-031-10078-9_11"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/TSMC.2018.2867497","article-title":"Improving bitcoin ownership identification using transaction patterns analysis","volume":"50","author":"Chang","year":"2018","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_26","unstructured":"Hercog, U., and Pov\u0161e, A. (2019). Taint analysis of the Bitcoin network. arXiv."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/10\/589\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:04:19Z","timestamp":1760112259000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/10\/589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,26]]},"references-count":26,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["info15100589"],"URL":"https:\/\/doi.org\/10.3390\/info15100589","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,26]]}}}