Q Safe Wallet
  • Getting Started
    • Overview
    • FAQs
  • Technical Details
    • Account Creation in Wallet
    • Quranium Chain Transaction Signing
    • ML-KEM Encryption for Backups
    • Backup and Recovery
  • All Features
    • Onboarding
    • Activity Section
    • Add Account
    • Multichain
    • Sending Transaction
    • Deposit Funds
    • Swapping
  • MULTICHAIN COMPATIBILITY
    • Quranium
    • Bitcoin & Derivatives
    • EVM
    • Solana
    • Other Chains
  • BEST PRACTICES
    • Secure Your Backup and Mnemonic
    • Validate Transaction Details Before Signing
    • Monitor Account Activity Across Chains
    • Safe Interaction with DApps
Powered by GitBook
On this page
  • Introduction
  • Key Tools for Monitoring
  • Best Practices
  • Step-by-Step Workflow
  • Common Mistakes to Avoid
  • Troubleshooting Unrecognized Activity
  • Note :
  1. BEST PRACTICES

Monitor Account Activity Across Chains

Introduction

Monitoring transactions across chains (e.g., EVM, Quranium, Bitcoin) is critical for detecting unauthorized access, resolving disputes, and ensuring asset security. This guide explains how to audit activity, use monitoring tools, and respond to anomalies using structured workflows and best practices.


Key Tools for Monitoring

Tool

Purpose

Activity Dashboard

Central hub to filter, track, and export transactions by chain.

Blockchain Explorers

Verify on-chain details (e.g., Etherscan for Ethereum, Quranium Explorer).

Alert Systems

Notify you of large transactions, new chain connections, or failed txs.


Best Practices

1. Use the Activity Dashboard

Filter and organize transactions efficiently:

Feature

How to Use It

Chain Filter

Isolate activity by chain (EVM, Quranium, Bitcoin).

Transaction Hash

Click to open the transaction in a blockchain explorer.


2. Verify Transactions on Explorers

Cross-check critical details using chain-specific explorers:

Bitcoin

Input/output addresses, transaction fees.

EVM

Recipient address, gas fees, smart contract calls.

Quranium

Transaction finality and confirmation count.


3. Configure Alerts

Customize notifications to stay informed:

Alert Type

Recommended Threshold

Purpose

Large Transactions

> $1,000

Detect unauthorized withdrawals.

New Chain Connections

Any

Warn about new wallet links.

Failed Transactions

Any

Investigate gas or network issues.


Step-by-Step Workflow

How to Investigate Suspicious Activity

Step

Action

Details

1

Filter by Chain

Use the Dashboard to isolate the chain with suspicious activity.

2

Review Transaction Hashes

Check recipient addresses and smart contract interactions on explorers.

3

Cross-Reference Addresses

Match against your saved address book or known contracts.

4

Revoke Access

Disconnect suspicious dApps/contracts immediately.


Common Mistakes to Avoid

Mistake

Risk

Solution

Ignoring small transactions

Hackers test with tiny amounts first.

Investigate all transactions.

Not auditing all chains

Cross-chain breaches go undetected.

Use the Chain Filter weekly.

Stale dApp permissions

Old approvals may still have access.

Revoke unused permissions monthly.


Troubleshooting Unrecognized Activity

Issue

Action

Unknown recipient address

Cross-check with your saved addresses or past transactions.

Unfamiliar contract call

Search the contract address on explorers to verify legitimacy.

Balance discrepancy

Sync your wallet and check for pending transactions.


Note :

Proactive monitoring across chains is essential to safeguard your assets. Use the Activity Dashboard to filter transactions, blockchain explorers to verify details, and alerts to stay ahead of threats. Regular audits and revoking unused permissions minimize risks. A single oversight can lead to irreversible losses.

PreviousValidate Transaction Details Before SigningNextSafe Interaction with DApps

Last updated 22 days ago