Intelligence Infrastructure on People and Entities

 Deploy AI agents that investigate, resolve identities, map relationships, and surface risk signals

From Identifier to Intelligence

From Identifier to Intelligence

From Identifier to Intelligence

64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
64
Identifier icon
kai.moran@protonmail.com

Start With Any Identifier

[01]

A name, email, phone number, wallet address, username, or company name. That's all it takes.

Social Media
K
Kai Moran
@kaimdev

Building at the intersection of security & AI. Founder @MeridianLabs.

San Francisco, CA·meridian-labs.io
847 Following2,381 Followers

Meridian Labs has closed its Series A. Building the future of automated due diligence 🚀

24 186 4.2K
X / Twitter
DE Corp Registry
GitHub
Forum
Daily Beat
x.com/@kaimdev
AGENT
K
Following
Kai Moran
@kaimdev
Building at the intersection of security & AI. Ex-@Palantir.
📍San Francisco, CA·🔗 meridian-labs.io
847 Following2.3K Followers
Handle@kaimdev
LocationSan Francisco

Agents Investigate Every Source

[02]

AI agents autonomously browse, extract, and cross reference across the open and dark web, official records, and unstructured documents.

47 data points · 23 sources · 6 flags detected · All cited

Kai Moran

San Francisco, CA
kai_m_dev · k.moran.sf · @kaimdev

Connected Accounts

Twitter @kaimdev
GitHub kai-moran
Reddit u/k_moran_sf
+ 9 more

Entity Affiliations

Meridian Labs Inc.Co-founder · · Delaware
Apex Capital GroupAdvisor · · Delaware
NovaTech LLCDirector · Dissolved · Wyoming
NovaTech LLC shares registered address with 14 other dissolved entities 🟡

Risk Signals

Sanctions
PEP Status
Court Records: Civil fraud complaint, Santa Clara County, 2021
Adverse Media: 3 results
Corporate Irregularity: NovaTech dissolved 3 days after SEC inquiry article
Shell Company Cluster: Registered agent address matches 14 dissolved entities in Wilmington, DE
Dark Web Exposure: Username found in 2 breach databases
Digital Footprint Gap: No online presence between Nov 2021 and Aug 2022 (9 months)

Financial Signals

Investor Activity: Linked to 2 entities with unresolved investor disputes
Funding Transparency: No disclosed funding across active entities
Revenue Signals: No verifiable revenue records found
Capital Movement Pattern: Irregular filing activity across entities

Network Intelligence

High-Risk Association: Direct link to entity flagged in prior SEC inquiry
Second-Degree Exposure: Connected to 6 high-risk profiles within extended network
Cluster Density: Operates within a tightly connected entity cluster (14+ nodes)

Complete Intelligence, Delivered

[03]

Exhaustive, structured profiles on people and entities with every data point sourced and cited. Ready for investigation, compliance, or decision making.

Where Teams Use Sixtyfour

Where Teams Use Sixtyfour

Intelligence Infrastructure

Embed Sixtyfour's research agents directly into your product, workflow, or data pipeline.

Intelligence Infrastructure

Embed Sixtyfour's research agents directly into your product, workflow, or data pipeline.

Identity Resolution

Resolve any identifier to a complete digital identity Start with a name, email, phone number, wallet address, or username.

Identity Resolution

Resolve any identifier to a complete digital identity Start with a name, email, phone number, wallet address, or username.

Background and Screening

The live intelligence layer behind modern background checks Power your screening workflows with real time data that static databases miss.

Background and Screening

The live intelligence layer behind modern background checks Power your screening workflows with real time data that static databases miss.

Threat Actor Intelligence

When your team identifies a threat actor, our agents map their full digital footprint: connected accounts, aliases, forum activity, dark web presence, and real world identity.

Entity Intelligence

Built for financial data platforms, investment research teams, and anyone conducting due diligence where completeness determines the outcome.

Case Studies
Identifiers InName, email, phone, or any combination sent via API
InvestigateAgents scan 40+ live sources to resolve identity and map full digital footprint
Compile ReportSocial profiles, aliases, public records, and exposure findings delivered with cited sources
MonitorContinuous scanning for new exposure, entity risk mapping, and enterprise dashboards
Brand
Cloaked protects people by removing their exposed data across the internet. Sixtyfour's research agents power the intelligence behind it, mapping every trace of a person's digital footprint so Cloaked knows exactly what to take down.
1
Ingest identifying information
Capture name, email, phone, or location. Accept any combination of identifiers.
2
Investigate across 40+ live sources
Agents search social platforms, data brokers, public records, and the open web to map the full digital footprint.
3
Compile Exposure Report
Every social profile, alias, public record, and connected account compiled into a structured report with cited sources and screenshots.
4
Power the enterprise risk dashboard
Visualize entity relationships, map exposure across high value targets, and monitor for new risks continuously.

See What Our Agents Find

Investigate any person or company right now on the platform.

See What Our Agents Find

Investigate any person or company right now on the platform.

See What Our Agents Find

Investigate any person or company right now on the platform.

See What Our Agents Find

Investigate any person or company right now on the platform.