Analyzing On-Chain Fund Flows Across Protocols

Wallet Finder

August 3, 2025

On-chain fund flows show how digital assets move across blockchain protocols, and understanding these movements is critical in decentralized finance (DeFi). Here's what you need to know:

  • What it is: On-chain fund flows track how tokens like Ethereum's ERC-20 move between platforms like lending protocols, decentralized exchanges, or cross-chain bridges.
  • Why it matters: Cross-chain systems expand opportunities but also increase risks. In 2024, $7 billion was linked to cross-chain laundering, with bridge protocols accounting for 64% of DeFi losses.
  • Key tools: Platforms like Wallet Finder.ai help analyze wallet activity, offering real-time alerts and tracking profitable strategies.
  • Trends: Institutions now manage 41% of DeFi's total value locked (TVL), focusing on stable returns through lending, staking, and liquidity strategies.
  • Risks: Security issues like bridge attacks, smart contract flaws, and oracle manipulation remain major concerns.

DeFi is evolving into a more interconnected and complex system. By analyzing fund flows and managing risks, users can make better decisions and stay ahead in this fast-changing space.

Cross-Chain Investigations: Tracing Crypto Across Blockchains

Methods for Tracking and Analyzing On-Chain Fund Flows

Tracking and analyzing on-chain fund flows requires a mix of reliable data, advanced techniques, and specialized tools. By converting massive blockchain datasets into meaningful insights, these methods help uncover patterns and trends in the movement of digital assets.

Data Sources for On-Chain Analysis

Accurate and detailed data is the backbone of fund flow analysis. Key sources include blockchain explorers, on-chain data providers, research platforms, and market data aggregators.

Blockchain explorers are often the first stop for tracking transactions, blocks, and wallet addresses. They allow users to trace asset movements and verify transaction histories. For instance, Blockchain.com supports both Bitcoin and Ethereum, while Etherscan specializes in Ethereum and other EVM-compatible chains.

On-chain data providers simplify raw blockchain information into formats that are easier to query and analyze. A good example is Dune Analytics, which uses Trino as its query engine and organizes blockchain data into schemas. It supports Ethereum/EVM chains as well as non-EVM blockchains, offering visualization tools like bar charts, time series, and Sankey diagrams.

The scale of blockchain data is enormous. For example, an Ethereum archive node requires over 21 TB of storage, while Solana's blockchain ledger exceeded 150 TB by early 2024. This makes specialized data providers essential for handling such vast datasets.

Research platforms like Messari provide in-depth analytics on blockchain networks, token ecosystems, and market trends. Meanwhile, market data providers such as CoinGecko compile cryptocurrency trends, token prices, and trading volumes, offering vital context for fund flow analysis.

Data accuracy is critical. Blockchain analytics platforms must address challenges like duplicate data, errors in smart contracts, and incomplete transaction records to ensure reliable insights.

Analysis Techniques in Fund Flow Analysis

Modern fund flow analysis uses advanced techniques to uncover patterns and trends, especially across multiple blockchains. With the rise of cross-chain transactions, these methods have become essential for tracking activities like illicit fund movements.

Transaction graph mapping is a key technique, focusing on identifying specific cross-chain bridges and tracking "lock" events on source blockchains alongside "mint" events on target blockchains. This often involves monitoring bridge-specific smart contracts on both ends.

Wallet clustering is another approach, linking addresses across different chains to reveal connections between wallets.

Fund flow visualization simplifies complex data into clear patterns. Tools offer visualizations ranging from bar charts and time series to intricate Sankey diagrams, which show how assets move between addresses and protocols.

For example, the Wormhole bridge demonstrates the scale of cross-chain activity. Since its launch, it has processed over $54 billion in transactions, with $100 million in daily transfers across 30 blockchains as of January 1, 2025. Ethereum accounts for over half of Wormhole's activity, while Solana and Sui are also popular destinations.

Staying updated on bridge protocol changes through official documentation is essential, as these systems evolve quickly. Analysts should also cross-validate findings from platforms like Dune Analytics with other sources, such as Token Terminal or DeFiLlama, to ensure consistency. Different providers may calculate metrics differently due to their unique interpretations of blockchain mechanics.

"Onchain analysis is essentially the equivalent of fundamental analysis in crypto... The primary goal of analyzing on-chain data is to find out whether the coin you're tracking is overbought or oversold."
– TradingRage, Finestel

Role of Wallet Finder.ai in Fund Flow Monitoring

Wallet Finder.ai

Wallet Finder.ai simplifies the complexities of analyzing cross-protocol fund flows, making it easier for traders and investors to gain actionable insights. The platform focuses on identifying and tracking profitable blockchain wallets.

With wallet performance tracking, users can monitor how successful traders move funds across protocols. This is especially useful for spotting strategies like arbitrage or yield farming.

Real-time alerts via Telegram notify users of significant market movements and wallet activities, enabling swift action when opportunities arise.

The platform’s advanced filters allow users to sort wallets by profitability and consistency. Custom watchlists can be created to track high-performing wallets, and users can analyze trading strategies, including entry and exit points. Data export features also make it easy to integrate Wallet Finder.ai insights with other tools for further analysis.

A personal wallet connection feature lets users track their own performance and compare it with top traders. By combining cross-protocol fund flow analysis with real-time alerts, Wallet Finder.ai enhances strategy development and risk management.

For professional traders and institutions, Wallet Finder.ai’s profit-focused analytics, paired with other data sources, provides a well-rounded framework for understanding and replicating successful strategies.

Key Protocols and Patterns in Cross-Protocol Fund Flows

Understanding how assets move across protocols can shed light on how decentralized finance (DeFi) operates. Recent data pinpoints key players in cross-protocol activity and highlights patterns that reflect both user preferences and market trends. These findings build on earlier tracking methods and help explain the flow of funds in this ecosystem.

Major Protocols Driving Fund Flows

Ethereum leads the way in cross-protocol asset movement, accounting for 47.9% of outflows and 38.9% of inflows across various blockchains. The most active route links Ethereum to Arbitrum, showcasing the strong connection between Layer 1 and Layer 2 solutions.

Circle's Cross-Chain Transfer Protocol (CCTP) facilitates large transactions. Unlike traditional lock-and-mint bridges, CCTP uses a burn-and-mint process for USDC transfers, ensuring 1:1 movement between blockchains. This approach improves liquidity and efficiency. Both CCTP and the Inter-Blockchain Communication (IBC) protocol maintain over 1.5 million monthly active addresses.

Interoperability protocols have scaled significantly. As of October 2024, top interoperability protocols handled over $41 billion in transactions, with a total value locked (TVL) of $8 billion across 43 protocols. IBC connects 117 blockchains, Hyperlane links 120, and LayerZero connects 114.

Intent-based bridging protocols like Stargate and Across are becoming popular for fast and cost-effective cross-chain transfers. These protocols prioritize user goals over specific transaction paths, making them efficient and user-friendly.

Within the lending sector, platforms are carving out distinct roles. Aave focuses on trading infrastructure, while Spark emphasizes capital optimization. This specialization highlights the evolution of DeFi, where platforms are increasingly complementary rather than directly competitive.

Common Fund Flow Patterns

Cross-protocol fund movements typically follow three main patterns: leverage cycling, liquidity migration, and yield optimization. These patterns reflect how users interact with multiple protocols to achieve their financial goals.

  • Leverage cycling involves borrowing collateral from one protocol to deposit it into another. For example, one institutional wallet borrowed over $5 billion across platforms, including $2.64 billion on Spark and $2.45 billion on Aave.
  • Liquidity migration happens when users move assets in response to changing incentives or market conditions. A notable example is the surge in decentralized exchange activity on SUI, which reached $10.3 billion in July 2025 - a 657% year-over-year increase as liquidity shifted to newer platforms.
  • Yield optimization involves complex strategies across multiple protocols. For instance, a MEV bot executed a $10 million arbitrage across seven protocols, using a flash loan from dYdX to earn $187,000 in a single transaction.

Stablecoins also show distinct usage trends. Institutional investors prefer DAI for long-term strategies, while USDC and USDT are favored for short-term arbitrage. This reflects varying risk appetites and time horizons among different users.

Interest rates significantly influence user behavior. Long-term borrowing (over 30 days) accounts for most revenue on both Aave (92.54%) and Spark (94.98%). However, the way funds are used differs: 44.25% of Aave’s borrowed funds support long-term positions, compared to 74.44% for Spark.

Recent Research on Cross-Protocol Flows

Recent studies have explored risks tied to these patterns. For example, a November 2, 2022, attack manipulated Chainlink's LUNA/USD price feed through Terraswap, causing a ripple effect across multiple protocols. This incident revealed how interconnected DeFi systems can amplify vulnerabilities.

Institutional investors are shifting their focus, treating DeFi as a channel for long-term capital allocation rather than just a tool for quick profits. This shift aligns with the dominance of long-term borrowing and the search for stable, predictable yields.

Automated trading strategies, such as MEV bots, are making waves. One bot alone managed $7.3 billion in borrowing activity on Aave V3, showcasing the scale of algorithmic fund flows across protocols.

Cross-chain security remains a critical issue. In 2022, nearly 70% of all cryptocurrency hacks targeted cross-chain bridges, exposing the risks involved in protocol interoperability.

"In the quantum world, reality exists in probability distributions until observed. In DeFi, the same asset can simultaneously collateralize loans, provide liquidity, and generate yield until a transaction collapses it into a single state." - Vishnu Govind

To address these challenges, zero-knowledge proofs (ZKPs) are gaining attention for their potential to enhance both scalability and security in blockchain interoperability. This technology could help mitigate some of the vulnerabilities seen in current cross-chain systems.

These protocols and patterns form the backbone of today’s cross-protocol fund flow ecosystem, where institutional strategies, automated trading, and individual user behaviors weave a complex and interconnected financial network.

Risk Factors in Cross-Protocol Fund Flow Analysis

As we dive deeper into cross-protocol fund flows, it’s essential to address the risks that come with them. These interconnected risks can magnify losses and disrupt the stability of DeFi ecosystems. Anyone involved in cross-chain activities should understand these risks because ignoring them can lead to serious consequences.

Identifying Key Risks

One of the biggest threats is smart contract vulnerabilities. These flaws in the code can be exploited by hackers to steal funds or manipulate transactions. For example, in 2024, about 8.5% of stolen funds between January and November were linked to such vulnerabilities. A notable case is the Wormhole exploit, where attackers bypassed the signature verification process and stole $325 million due to a smart contract flaw.

Another major issue involves cross-chain bridge attacks. These have become a favorite target for hackers. In 2022, bridge attacks made up 69% of all stolen assets, totaling $2 billion across 13 separate hacks. The complexity of bridge protocols, which need to secure multiple blockchains at once, makes them particularly vulnerable.

Centralization risks also pose a serious challenge. When bridges depend on a small number of validators or centralized systems, they become easy targets. The Ronin Bridge attack in March 2022 is a prime example. The North Korean Lazarus Group exploited the bridge’s centralized validation system, stealing $540 million in crypto. The stolen USDC was converted to Ether on decentralized exchanges and laundered through Tornado Cash.

Oracle manipulation is another critical issue. Attackers can tamper with price feeds to trigger liquidations or create opportunities for arbitrage across protocols.

Liquidity risks are heightened in cross-protocol environments. Large fund movements can drain liquidity pools, causing slippage and affecting prices across multiple platforms. This becomes especially dangerous during market stress when users move assets to what they believe are safer protocols.

Money laundering and compliance risks are growing concerns as criminals use cross-protocol flows to hide the origins of their funds. According to the US Treasury’s Financial Crimes Enforcement Network (FinCEN), “illicit actors often engage in the practice of 'chain hopping' to obscure the origin of their funds". RenBridge alone has been used to launder over $540 million in crypto, and the Conti ransomware gang laundered more than $53 million in Bitcoin through the same bridge between 2021 and 2022.

Lastly, access control vulnerabilities can allow attackers to bypass critical security measures. The Poly Network attack is a clear example, where an attacker exploited contract functions to gain unauthorized access, leading to significant losses. Similarly, Qubit Finance on Binance Smart Chain lost $80 million worth of BNB tokens when attackers manipulated contract functions.

Risk Reduction Strategies

To manage these risks, several strategies can be applied:

  • Real-time monitoring with tools like Wallet Finder.ai can help detect unusual fund movements, identify exploits in progress, and provide alerts about significant market changes that might signal emerging threats.
  • Diversification across protocols and chains is another key strategy. Spreading activities across multiple platforms reduces reliance on a single point of failure. However, this requires careful monitoring of each platform’s security and audit history.
  • Due diligence on protocol security is crucial. This includes reviewing audit reports, checking the development team’s track record, and understanding each protocol’s security measures, such as how they handle validators, signature verification, and access controls.
  • Transaction timing and size management can lower the risk of front-running attacks. Breaking large transactions into smaller ones and executing them during busy periods can make them less noticeable to attackers.
  • Multi-signature wallets add an extra layer of protection for large-scale fund movements. By requiring multiple approvals, they make it harder for hackers to access funds even if one private key is compromised.
  • Regular security assessments are vital for staying ahead of new vulnerabilities and adjusting strategies as threats evolve. The DeFi landscape changes quickly, and a protocol that seems secure today might reveal weaknesses tomorrow.
  • Compliance monitoring is becoming more important as regulations tighten. Tools that track the origins and destinations of funds across multiple protocols can help meet anti-money laundering requirements and avoid interacting with sanctioned addresses.
  • Emergency response planning is essential for reacting to exploits. This includes having pre-approved withdrawal addresses and tested procedures to quickly move funds from compromised protocols to safer alternatives. Acting fast can make a huge difference during a crisis.

These strategies are crucial for protecting assets in the ever-changing world of cross-protocol fund flows. With nearly $10 billion lost to crypto-related risks in 2024, it’s clear that comprehensive risk management - covering both technical and human factors - is more important than ever.

sbb-itb-a2160cf

Case Study: Institutional Capital Flows Across Protocols

Institutional investors are now setting the pace for how capital moves across DeFi protocols. What started as cautious experiments has grown into complex strategies involving billions of dollars. By examining how these major players allocate funds, we can see how they're reshaping the DeFi landscape.

Institutional Strategies and Allocation Patterns

Gone are the days of simple buy-and-hold strategies for institutional investors. Today, institutional-grade wallets make up about 41% of the total value locked (TVL) in DeFi protocols - an impressive jump from just 17% in 2023. This translates to over $86 billion in institutional capital spread across various strategies, signaling a major shift in how traditional finance views DeFi.

According to a PwC report, institutional allocations in DeFi break down as follows:

  • 35% to liquid staking
  • 25% to overcollateralized lending
  • 15% to AMM (automated market maker) liquidity
  • 12% to option writing
  • 8% to real-world asset (RWA) yield
  • 5% to other strategies

This allocation shows a clear preference for strategies with proven returns, as institutions prioritize stability over experimental approaches.

One standout example is a university endowment that allocated funds to DeFi yield strategies. Over 12 months, this allocation outperformed its fixed-income portfolio by 387 basis points. Such results have caught the attention of other institutional investors, including pension funds, driving even greater interest in DeFi.

The move from passive to active strategies is especially noticeable in the staking market. For example, 105 whale addresses recently withdrew $3.5 billion from Lido, redistributing these funds across multiple protocols to maximize returns. In total, whales redeployed 11.97 million ETH (worth $18.9 billion), with allocations showing strategic intent:

  • $4.6 billion went to Aave as a leverage hub
  • $551 million was allocated to Compound as a liquidity buffer
  • $413 million flowed into Spark as a gateway for DAI investments

This diversification highlights how institutions specialize their strategies by using different platforms for specific purposes.

Emma Richardson, Head of Digital Assets at Wellington Management, summed up this shift:

"Traditional fixed income portfolios face structural challenges in the current market environment. Well-constructed DeFi allocations can potentially offer diversification benefits and yield enhancement when implemented with appropriate risk controls."

The numbers back up this optimism. Eighty-three percent of institutional investors plan to increase their cryptocurrency holdings, and $1.1 billion in venture capital is being directed toward blockchain startups, with many focusing on DeFi. Additionally, DeFi engagement is expected to rise significantly - from 24% now to 75% within the next two years.

Protocol Comparison for Institutional Use

Institutional investors choose protocols based on their specific strengths and weaknesses. Here's how some of the most popular protocols stack up:

Protocol Advantages Disadvantages Institutional Use Case
Aave Advanced trading tools, flash loans, short-term liquidity; $4.6B institutional allocation Volatile interest rates, complex compliance Serves as a key leverage hub for active trading
Spark Focus on capital efficiency, stable returns, 63% higher DAI yields (0.57% vs 0.35%); larger DAI market (3.5× Aave's size) Limited scale and fewer asset options Ideal for institutions seeking stable, optimized returns
Compound Reliable liquidity buffer - Acts as a liquidity reserve for institutions

Aave stands out as the go-to platform for active trading strategies, thanks to its sophisticated lending features and flash loans. On the other hand, Spark appeals to institutions focused on long-term stability and yield optimization. The 63% higher DAI yields on Spark compared to Aave (0.57% vs 0.35%) make it particularly attractive for those managing large stablecoin holdings. Despite its smaller scale, Spark's larger DAI market (3.5× Aave's size) adds another layer of appeal.

Institutions are also blending traditional and DeFi strategies. For example, BlackRock's BUIDL fund - a tokenized U.S. Treasury fund - now holds $2.4 billion in assets. Hybrid products are also gaining traction, offering 4.8% annualized yields on stablecoin deposits. These developments show how traditional asset managers are leveraging DeFi to enhance their offerings.

As compliance, yield optimization, and risk management take center stage, institutions are no longer asking whether to participate in DeFi - they're figuring out the best ways to do so. With 52% of institutions expected to engage in crypto lending by 2025, up from 39% in 2023, it's clear that institutional adoption is about building a robust financial framework. By strategically allocating capital across protocols, institutions are crafting a diversified approach that balances risk with opportunity.

Conclusion: Key Takeaways from Fund Flow Analysis

The analysis of cross-protocol fund flows reveals that DeFi is growing from its early roots in yield farming into a more refined, institution-ready financial system.

By examining the methods and insights discussed earlier, it's clear that capital is being dynamically reallocated across the ecosystem. Stability has taken center stage in institutional DeFi strategies, with $18.9 billion actively moved to balance returns and risks effectively.

"The apparent decline in Lido's dominance masks a far more significant transformation: the emergence of sophisticated institutional DeFi strategies that leverage multiple protocols for optimized capital efficiency." - WalleDAO

Protocols are now focusing on specialization rather than just scaling. For example, Aave processed $4.6 billion in institutional flows, establishing itself as a key hub for leverage. Meanwhile, Spark saw $413 million allocated as a DAI gateway, offering yields 63% higher than Aave's (0.57% vs. 0.35%). Spark also facilitated $1.25 billion in zero-slippage trades, showcasing how targeted optimization can outperform broader strategies.

Tools like Wallet Finder.ai make it easier for traders and institutions to track these trends. By offering real-time wallet tracking, personalized alerts, and complete wallet histories, this platform has helped users achieve an average return of 340%. Such tools highlight the shift toward more strategic monitoring as DeFi matures beyond its experimental phase.

Cross-protocol integration has also become a defining feature of the ecosystem. Understanding how capital flows across different platforms is now crucial for optimizing returns and minimizing risks.

The increasing demand for stability in institutional DeFi shows a clear move toward long-term lending and capital efficiency over speculative gains. This evolution points to DeFi's transformation into a more sustainable financial system. By staying informed on cross-protocol fund flows, traders and institutions can actively participate in this growth rather than simply observing it.

FAQs

How can analyzing on-chain fund flows help identify risks and opportunities in DeFi?

Analyzing on-chain fund flows plays a key role in understanding the risks and spotting opportunities within decentralized finance (DeFi). By observing how money moves through various protocols, you can pinpoint areas with high liquidity, identify potential weak spots, and notice new trends in the market.

For instance, a surge in fund inflows might suggest growing trust in a particular protocol, while sudden outflows could raise red flags about security issues or liquidity challenges. Keeping track of these movements can also help uncover illegal activities and assess the overall health of DeFi systems. This information empowers both investors and developers to make smarter decisions and manage risks more effectively.

What are the key risks and challenges of using cross-chain bridge protocols in DeFi?

Risks and Challenges of Cross-Chain Bridge Protocols in DeFi

Cross-chain bridge protocols in decentralized finance (DeFi) come with some serious risks and hurdles. One of the biggest concerns is security vulnerabilities. Hackers often exploit flaws in smart contracts to steal funds. These bridges are incredibly complex, which unfortunately makes them a popular target for attacks. To put this into perspective, recent reports reveal that nearly $2 billion has been lost due to cross-chain bridge hacks.

Another pressing issue is the misuse of these protocols for illegal activities, such as money laundering. This not only raises security concerns but also puts the entire ecosystem under scrutiny. These challenges underline the need for thorough auditing and strong security measures to ensure safer use of cross-chain bridges.

How does Wallet Finder.ai help traders and institutions improve their DeFi strategies and manage risks effectively?

Wallet Finder.ai equips traders and institutions with powerful tools to improve their DeFi strategies and reduce risks. One of its standout features is the ability to spot potential scams in token contracts and highlight suspicious activities, giving users an extra layer of security for smarter investment choices.

Beyond security, Wallet Finder.ai delivers in-depth analytics to monitor wallet performance, study trading behaviors, and evaluate risk levels. These insights help users make informed decisions and manage their portfolios more effectively, keeping them ahead in the ever-changing world of DeFi.

Copy Winning Trades Instantly

4.9 Rating based reviews on

Product of the Day Badge

"I've tried the beta version of Walletfinder.ai extensively and I was blown away by how you can filter through the data, and the massive profitable wallets available in the filter presets, unbelievably valuable for any trader or copy trader. This is unfair advantage."

Pablo Massa

Experienced DeFi Trader