Autonomous OSINT Investigations. Certainty Delivered.

Point Axiom Intel at a target and get a structured intelligence brief — entities mapped, relationships discovered, gaps identified, sub-investigations spawned automatically. Hours, not weeks.

2,105
Entities discovered
610
Relationships mapped
165
Findings generated
~2.2 hrs
Fully autonomous

How It Works

You define the question. Axiom Intel finds the answer.

1

Set an Intelligence Goal

Name a target entity and define your intelligence question. Use AI-assisted goal refinement to sharpen the objective. Four quick-start templates: Corporate Investigation, Person of Interest, Domain/Infrastructure, Financial Network.

2

The Investigation Engine Runs

Choose Quick, Standard, or Thorough mode with configurable cycles. The platform autonomously generates search strategies, collects from multiple sources through encrypted proxy chains, normalizes entities with AI, discovers relationships, and identifies intelligence gaps — spawning sub-investigations to fill them.

3

Get Your Scored Brief

Receive a versioned executive summary with a 0–100 certainty score that tracks across brief versions, an entity graph, relationship map, and identified gaps. Export as PDF. Deliver to your client.

2–3 weeks manual ~2 hours

Built for Serious Investigations

Autonomous Intelligence Cycle

Search → collect → normalize → relate → summarize → identify gaps → spawn sub-investigations. The Investigation Engine runs the full intelligence cycle unattended while you work on other things.

Isolated Infrastructure

Every customer gets their own dedicated server with rotating proxy pool and encrypted database. Your investigation data never touches another customer's infrastructure.

Certainty Scoring

Every investigation produces a 0–100 certainty score displayed as a ring chart that tracks across brief versions. See exactly how comprehensively your intelligence question has been answered. No other tool does this.

Multi-Source Collection

URL Collector, Search & Scan across news and web engines, Username Scan across 400+ platforms, and Corporate Registry Search via custom corporate registry scanner — all automated, all routed through your isolated infrastructure.

AI Relationship Discovery

Zero-cost attribute clustering (shared tracking IDs, certificates, email domains) followed by AI-powered relationship mapping. Discovers connections humans miss.

Executive Summaries

Versioned intelligence briefs in structured format: BLUF, key findings, entity overview, relationship analysis, assessment, gaps, and recommended next steps. Export as PDF or CSV.

Ready to see what autonomous OSINT can do for your investigations?

Trusted by security analysts, corporate investigators, and intelligence professionals worldwide.

See the Platform

Real screenshots from a live investigation.

3D relationship graph — interactive entity network visualization with controls panel

Relationship Graph

See every connection the engine discovers. Click any entity to trace relationships, view attributes, and verify against source URLs.

Investigation findings — 165 categorized intelligence findings with confidence levels

Investigation Findings

Every finding carries a confidence score and cites specific open sources. Verify any claim independently -- no black boxes.

Axiom Intelligence Platform — Command center dashboard with intelligence findings, certainty scoring, and active operations

Dashboard

Track your full investigation portfolio -- entities collected, credits remaining, active investigations, and results delivered. All in one view.

Choose Your Plan

Every plan includes a dedicated isolated server, proxy rotation, and full platform access. Your credentials are delivered within 15 minutes of payment.

⚡ Your instance is provisioned in 15 minutes

A single due diligence engagement from a consulting firm runs $5,000–$25,000 and takes weeks. Your first Axiom investigation delivers a scored brief in under 3 hours.

Starter

For independent investigators, journalists, and solo analysts

Best for solo investigators & journalists

$150 / month
~10 standard investigations/mo
  • Dedicated isolated server
  • 3 concurrent investigations
  • Standard depth (5 cycles)
  • $5/mo AI budget included
  • Email support (24hr response)
Instance ready in 15 minutes

Enterprise

For government agencies, regulated firms, and custom deployment requirements

Best for government & regulated industries

Custom
Unlimited investigations, custom terms
  • Dedicated high-capacity infrastructure
  • Unlimited investigations
  • Custom AI budget allocation
  • API access for integration
  • SLA with dedicated support
  • Custom data retention policies

All plans include: rotating proxy pool, encrypted database, automated daily backups, and full data export.
AI overages billed at cost + 20%. Cancel anytime. 30-day data retention on cancellation.

Not sure which plan fits? Tell us about your use case and we'll recommend the right setup.

Already a subscriber?

Need more investigation capacity? Purchase credit packs for your existing instance.

CASE STUDY

Mapping a State-Linked Private Military Network Across 3 Continents

Investigation Results
~2.2 hrs
Runtime
85
Certainty
2,105
Entities
610
Relationships
165
Findings
447 Organizations 204 Persons 165 Locations 123 Companies 35 Domains

The Question

A security analyst needed to identify and map the financial, logistical, and operational networks connecting three state-affiliated private military organizations operating across the Sahel, Central Africa, and the Middle East -- including shell companies, proxy directors, front entities, financial intermediaries, and sanctions-evasion structures spanning multiple jurisdictions.

What Axiom Intel Did

The analyst entered a goal statement describing the three organizations and their suspected areas of operation. The platform autonomously generated 83 search strategies, collected from corporate registries, news archives, sanctions databases, and public records across multiple countries, and produced 5 progressively refined executive briefs as new intelligence emerged -- each with an updated certainty score tracking what had been answered and what remained unknown.

Investigation command center showing 85/100 certainty score, 705 entities, 369 relationships, collection stats with sparklines, and investigation engine controls
The investigation command center: 85/100 certainty score, real-time collection stats with sparklines, and investigation engine controls.

Investigation Depth

Search Coverage
83 unique search strategies across news, web, and corporate registry sources spanning multiple jurisdictions
Source Processing
Corporate registries (UAE, UK, US, Turkey, DRC), sanctions databases, ICIJ leak archives, certificate transparency logs, news archives in 4 languages
Noise Reduction
Irrelevant results filtered automatically -- the platform discarded noise so only actionable intelligence objects reached the final output

What It Found

Organizational Networks
245 association and 33 ownership relationships traced across corporate structures, subsidiaries, and organizational hierarchies
Operational Footprint
129 co-location connections and 34 shared infrastructure links mapped -- overlapping offices, shared digital assets, and coordinated operational footprints
Identity Resolution
74 alias relationships and 52 membership links resolved -- connecting PMO front entities, successor organizations, and personnel across alias networks
Force-directed relationship graph visualization showing 848 entities and 384 links with color-coded entity types
The full relationship graph for this investigation -- 848 entities and 384 links visualized as an interactive force-directed network. Nodes are color-coded by entity type. Click any node to inspect its connections.
Relationship graph showing entity detail panel for Nigerian Immigration Service with 8 connections to related organizations
Clicking an entity reveals its connections and attributes. Here, the Nigerian Immigration Service shows 8 connections to related organizations -- all discovered and linked automatically.
Executive intelligence brief — classified format with cited findings and certainty scoring
Finding F-031: Wagner Group transitioning to Africa Corps -- with supporting entities, source URLs, and confidence assessment.

Cited, Verifiable Findings

Every finding in an Axiom investigation carries an in-text citation reference (e.g., [F-031]) that appears directly in the executive brief. Click any reference to see the full finding detail -- including the supporting entities, confidence level, category, discovery method, and every source URL used to establish it.

This means every claim in the brief is traceable back to specific open sources. Analysts can verify findings independently, assess confidence, and identify which sources contributed to each conclusion. No black boxes.

Key Finding

Axiom Intel autonomously mapped the full operational architecture of Russian, Chinese, South African, and Turkish private military organizations across Africa -- identifying 74 alias relationships connecting front entities to successor organizations, 129 co-location links revealing shared operational bases, and 33 ownership chains tracing corporate control structures. The platform confirmed the Wagner Group's formal transition into the Africa Corps under GRU control, mapped Frontier Services Group's acquisition strategy consolidating Chinese PMO dominance in East Africa through Hong Kong financial channels, and traced the Dyck Advisory Group's counter-insurgency deployments across Cabo Delgado -- all in 2.2 hours of autonomous operation.

This investigation ran autonomously in 2.2 hours. Ready to run your own?

Intelligence Gaps Identified

The investigation reached 85/100 certainty. The platform identified what it could not answer from open sources -- including sealed corporate registry filings in two US states, undisclosed executive officers behind offshore holding structures, and specific transactional evidence (SWIFT data, bills of lading) linking mine output to specific refineries. These gaps were documented with recommended collection methods for human follow-up.

UNCLASSIFIED // FOR OFFICIAL USE ONLY

Private Military Organizations in Africa V1

Version 3 — March 30, 2026 — 19:34 UTC — Certainty: 85/100

Executive Intelligence Summary

Classification

UNCLASSIFIED // FOR OFFICIAL USE ONLY

Subject

Operational Baseline of Private Military Organizations (PMOs) in Africa (Trailing 12 Months)

Bottom Line Up Front

Open-source intelligence confirmed that the African private military landscape over the last 12 months was dominated by Russian, Chinese, South African, and Turkish entities, each operating with distinct state-aligned or commercial mandates. The investigation successfully mapped the legal names, alias networks, and specific sub-national deployments of these PMOs, revealing that Russian forces prioritized regime survival and resource extraction in the Sahel, Chinese firms focused on Belt and Road Initiative (BRI) infrastructure protection in East Africa, and South African groups engaged in commercial counter-insurgency. Certainty Score: 85/100

Extensive entity object expansion (over 10%) and the resolution of OSINT sub-project gaps regarding specific sub-national deployment zones for the Africa Corps and Chinese PMOs justified a high-confidence assessment, though precise tactical troop counts and specific financial contracts remained partially obscured.

Key Findings

  • Russian MoD Assimilation of Wagner: The Russian state formally transitioned the Wagner Group [F-031] into the “Africa Corps” under the direct operational control of the Russian Ministry of Defense and military intelligence (GRU) [F-032], [F-119]. Africa Corps maintained an extensive operational footprint across the Sahel and Central Africa [F-034], specifically deploying to Ouagadougou and Loumbila in Burkina Faso [F-114], as well as Niamey, Mali, and the Central African Republic (CAR) [F-010].
  • Chinese PMO Consolidation in East Africa: Chinese PMOs [F-012] significantly expanded their footprint to protect state-owned assets and BRI infrastructure, prioritizing facility protection over combat [F-106]. Frontier Services Group (FSG) consolidated regional dominance by acquiring Beijing DeWe Security Service and Kenyan aviation assets [F-088], utilizing Hong Kong as a financial hub [F-064], [F-093] and Nairobi as a forward operational base [F-069].
  • South African Commercial Counter-Insurgency: South Africa continued to serve as a vital historical and contemporary hub for PMO logistics [F-014]. The highly connected Dyck Advisory Group (DAG) [F-027], [F-077] extensively leveraged this infrastructure to conduct active deployments in Mozambique [F-037], specifically operating in Cabo Delgado hubs including Macomia [F-083], Pemba [F-084], and Maputo [F-085] to counter Ansar al-Sunna insurgents [F-139].
  • High-Activity Geographic Nexus Zones: The Democratic Republic of the Congo (DRC) functioned as a highly concentrated operational hub for multiple competing mercenary networks [F-030]. Similarly, North East Mali emerged as a critical conflict node where Russian forces repeatedly engaged insurgent coalitions [F-156].
  • Turkish PMO Structuring: SADAT International Defense Consultancy rapidly structured its corporate entities in Turkey to facilitate international military consulting and operations [F-013], [F-141].

Entity Overview

Entity Category Key Organizations & Aliases Operational Jurisdiction & Sub-National Bases Primary Observed Mandate
Russian State PMOs Africa Corps, Wagner Group, Redut, Convoy, M Invest, Bear Brigade Burkina Faso (Loumbila, Ouagadougou), Niger (Niamey), Mali (Aguelhok), Sudan, CAR Regime survival, proxy warfare, resource extraction (Nordgold)
Chinese PMOs Frontier Services Group (FSG), Beijing DeWe Security Service, Huaxin Zhong An Kenya (Nairobi), Djibouti, DRC, Tanzania, Zambia BRI infrastructure defense, asset protection for State-Owned Enterprises
South African PMOs Dyck Advisory Group (DAG), Executive Outcomes, Paramount Group, Umbra Aviation Mozambique (Cabo Delgado, Macomia, Pemba), South Africa Direct combat, counter-insurgency, aviation logistics
Turkish PMOs SADAT Defense Consultancy, Akademi Sancak Turkey, Somalia, Libya, Horn of Africa Military consulting, host-nation force training
Host/Adversary Actors Alliance of Sahel States (AES), RSF, JNIM, ISGS, Ansar al-Sunna Sahel region, Sudan (Darfur), Mozambique Insurgency, host-nation agreements, localized conflict

Relationship Map (Narrative)

The architecture of PMOs in Africa relied heavily on complex alias networks, state-sponsorship, and shared physical infrastructure. Russian mercenary operations were fully subordinated to the Russian Ministry of Defense. GRU officials, prominently Deputy Defense Minister Yunus-bek Yevkurov [F-115] and General Andrey Averyanov [F-122], directly negotiated host-nation agreements with junta leaders like Ibrahim Traoré (Burkina Faso) and Abdourahamane Tiani (Niger) to base Africa Corps personnel. These deployments were financially sustained through overlapping corporate networks tied to Russian resource extraction entities, notably Nordgold in Burkina Faso. An operational correlation was also verified in Sudan, where the Russian-linked M Invest shared geographic footprints with the Rapid Support Forces (RSF) [F-017].

Chinese operations demonstrated deep alignment with the Chinese Communist Party’s strategic goals but operated distinctly from Russian kinetic forces. FSG, financially backed by the state-owned CITIC Group, absorbed regional competitors to protect China National Petroleum Corporation (CNPC) assets and BRI railways. Hua Xin Zhong An (HXZA) operated in Djibouti in close geographic coordination with the People’s Liberation Army (PLA) Support Base, illustrating a formalized civil-military integration.

In the commercial sector, the South African PMO ecosystem was driven by legacy networks, with Executive Outcomes [F-028] and WatchGuard [F-018] historical frameworks influencing modern outfits. The Dyck Advisory Group (DAG) was contracted directly by the Mozambican government and corporate entities (TotalEnergies) to provide combat aviation support against the Islamic State’s Central Africa Province and Ahlu Sunnah Wa-Jama in Cabo Delgado, acting as a force multiplier for local militaries. Think tanks and policy institutes like CSIS [F-020] actively monitored these complex networks to assess their impact on regional stability.

Assessment

With high confidence, the deployment of Private Military Organizations across Africa has fractured into two distinct models: state-subsidized strategic proxy forces (Russia, China, Turkey) and commercial kinetic contractors (South Africa). The absorption of Wagner into the Africa Corps represents a formalization of Russian hybrid warfare designed to outcompete Western influence while securing mineral rights. Chinese PMOs will likely continue expanding their footprint, operating strictly defensively to secure economic supply chains without engaging in host-nation internal conflicts. African states facing critical insurgencies (e.g., Mozambique, DRC) will likely continue procuring commercial PMOs like DAG to bridge tactical shortfalls in their national militaries.

Intelligence Gaps

OSINT Gaps
  • Specific financial compensation parameters and the exact values of resource concessions granted to Nordgold and other Russian shell companies funding the Africa Corps.
  • The precise tactical deployment numbers and kinetic capabilities of Chinese PMO personnel at specific BRI infrastructure nodes.
  • Comprehensive corporate records mapping the remaining decentralized alias networks of former Wagner entities that have not formally integrated into the Africa Corps.
External Collection Gaps
  • Signals intelligence (SIGINT) regarding the command and control communications between GRU handlers in Moscow and Africa Corps forward operating bases in Loumbila and Niamey.
  • Human intelligence (HUMINT) detailing the coordination protocols between Chinese PMO leadership (FSG/HXZA) and the PLA Support Base in Djibouti.
  • Classified satellite imagery analysis of the physical security postures and vehicle complements at Africa Corps headquarters in Ouagadougou.

Recommended Next Steps

  • Targeted Financial Tracking: Execute a deep-dive corporate records and financial ledger analysis of Nordgold and associated Russian mining fronts in Burkina Faso and the CAR to map the Africa Corps compensation structure.
  • Corporate Network Monitoring: Continuously monitor Hong Kong [F-064] and Turkish trade registries to identify newly formed subsidiaries under FSG and SADAT [F-141] that may obscure future deployments.
  • Geospatial Profiling: Task commercial and open-source satellite imagery analysis on known Africa Corps facilities in Loumbila and Niamey, as well as Chinese logistics hubs in Nairobi, to establish baseline personnel and equipment counts.
Download Executive Brief (PDF) Download Full Export (CSV) 85 / 100

Contact Us

For enterprise pricing, government procurement, or custom deployment requirements.

Email us directly at support@axiomisr.com or use the form below.

Documentation & Support

Guides for getting started and getting help with your Axiom Intel instance.

Getting Started

Your instance is provisioned automatically after payment. This guide covers logging in, creating your first investigation, setting an intelligence goal, and understanding results.

Read Guide →

Security Architecture

How your dedicated instance is isolated: rotating proxy pool, encrypted database, automated backups, and data retention policies.

Read Guide →

Support

Contact support for technical issues, billing questions, or feature requests. Starter: 24hr response. Professional: 12hr response. Enterprise: SLA-bound.

Contact Support →

Frequently Asked Questions

Common questions about Axiom Intel.

Your dedicated server instance is provisioned automatically within 15 minutes of payment. You will receive an email with your instance URL and a one-time setup link to create your password. No installation, no configuration -- you can launch your first investigation immediately.
The platform autonomously collects from web search engines, news archives, corporate registries across 60+ jurisdictions, certificate transparency logs, username databases covering 400+ platforms, Wikipedia, sanctions lists, and any public URL you provide. All collection routes through your dedicated proxy infrastructure for operational security.
No. Every customer gets a dedicated, isolated server. Your data never touches another customer's infrastructure. There is no multi-tenant database, no shared storage, and no data commingling at any level. When you cancel, your instance and all data are permanently destroyed after 30 days.
Every finding includes a confidence score and cites specific open sources with direct URLs. The certainty score (0-100) tracks how comprehensively your intelligence question has been answered. This lets you verify any claim independently. Axiom Intel is a force multiplier for human analysts -- it surfaces connections and structures evidence, but professional judgment remains essential.
Yes. Export executive briefs as professionally formatted PDFs ready for client delivery, or download the full entity and relationship dataset as CSV for import into your own analysis tools. The PDF brief follows a structured intelligence format (BLUF, key findings, entity overview, relationship map, assessment, gaps, next steps) suitable for executive audiences.
You can purchase additional investigation credit packs at any time without changing your plan. Credits never expire and work with all investigation modes (Quick, Standard, Deep, Thorough). If you consistently need more capacity, upgrading to Professional gives you more included credits and deeper investigation capabilities.
← Back to Docs

Getting Started

From payment to your first intelligence brief

1. Account Provisioning

After completing payment, your dedicated Axiom Intel instance is provisioned automatically. Within 15 minutes, you will receive an email at the address used during checkout containing:

  • Your instance URL (a dedicated server exclusively for your account)
  • A one-time setup link to create your password

Click the setup link, choose a password, and you are in. Your instance is fully isolated -- no other customer can access your server, data, or investigations.

2. Creating Your First Investigation

From the dashboard, click New Investigation. You will be guided through three steps:

Project Setup

Name your investigation and optionally add tags for organization. The name should describe the target or topic (e.g., "Wagner Group Africa Operations" or "Acme Corp Due Diligence").

Intelligence Goal

Define what you want to know in plain language. Be specific about the entities, relationships, and jurisdictions you care about. Use the AI-assisted goal refinement to sharpen your objective -- the platform will suggest improvements to maximize investigative coverage.

Review & Launch

Choose your investigation mode (Quick, Standard, Deep, or Thorough) based on how comprehensive you need the results to be. Each mode consumes a different number of credits. Review your goal and launch the investigation.

3. Investigation Modes

Each mode balances speed, depth, and credit cost:

  • Quick (0.5 credits) -- 2 collection cycles, 1 sub-project. Best for rapid background checks and single-entity lookups.
  • Standard (1 credit) -- 3 cycles, 2 sub-projects. The default for routine due diligence and corporate profiling.
  • Deep (3 credits) -- 5 cycles, 3 sub-projects, depth 2. For complex investigations requiring network mapping and cross-jurisdictional analysis.
  • Thorough (6 credits) -- 10 cycles, 5 sub-projects, depth 2. Maximum coverage for deep-dive research across multiple jurisdictions.

4. Monitoring Progress

Once launched, the Investigation Engine runs autonomously. You can monitor progress in real time from the project page:

  • Certainty Score -- a 0-100 ring chart that tracks how comprehensively your intelligence question has been answered
  • Collection Stats -- entity count, relationship count, and source processing metrics updated live
  • Task List -- see what the engine is doing right now (collecting, normalizing, analyzing, generating briefs)
  • Relationship Graph -- watch the entity network form as new connections are discovered

You do not need to keep the page open. The investigation runs on your dedicated server and you can return at any time to check status.

5. Reviewing Results

When the investigation completes, you will find:

  • Executive Brief -- a structured intelligence summary with BLUF, key findings, entity overview, relationship analysis, assessment, intelligence gaps, and recommended next steps. Each brief is versioned and scored.
  • Investigation Findings -- discrete findings with reference IDs, confidence levels, categories, and source attribution
  • Intelligence Objects -- all discovered entities (persons, companies, organizations, locations, domains, etc.) with attributes and source URLs
  • Relationships -- mapped connections between entities with confidence scores
  • Relationship Graph -- interactive force-directed visualization of the entire entity network

6. Exporting

Export your results in multiple formats:

  • PDF -- the executive brief formatted as a professional intelligence report
  • CSV -- entity and relationship data for import into your own analysis tools
← Back to Docs

Security Architecture

How your investigations are protected

Dedicated Single-Tenant Infrastructure

Every Axiom Intel customer receives their own dedicated server instance. Your server is not shared with any other customer. Your investigation data, collected content, AI-generated analysis, and configuration are stored exclusively on your instance. No data commingling occurs at any level.

Network Security

  • Rotating proxy pool -- collection traffic is distributed across a rotating pool of proxies, preventing source sites from correlating requests back to your instance.
  • TLS encryption -- all data in transit between your browser and the service is encrypted using TLS 1.2 or higher.
  • Firewall rules -- access is restricted to necessary ports only. SSH is key-based (no password authentication).

Data Encryption

  • Secrets at rest -- API keys and other sensitive configuration data are encrypted using Fernet symmetric encryption derived from a per-instance secret key.
  • Database credentials -- generated per-instance and not shared across any infrastructure.
  • Passwords -- hashed, never stored in plaintext.

Backups

Automated daily database backups are stored in encrypted object storage in a separate account from your server instance. Backups are retained for 30 days and then permanently deleted. Backup storage is encrypted at rest by the storage provider.

Data Retention

  • Active accounts -- data retained on your dedicated instance for the duration of your subscription.
  • After cancellation -- instance and all data retained for 30 calendar days to allow data export. After 30 days, the instance and all associated data are permanently and irreversibly destroyed.
  • Backups -- retained for 30 days, then permanently deleted.

Access Control

Access to your dedicated instance is restricted to:

  • You -- through the web interface using your account credentials.
  • Authorized personnel -- only for infrastructure-level maintenance. We do not access, review, or analyze the content of your investigations without explicit written permission.

Third-Party Processing

Investigation text is sent to Google Gemini API for AI analysis. Your personal account information is not sent to Google. Web traffic is routed through commercial proxy providers who see destination URLs and traffic volume, but not investigation context or your identity. Payment data is processed by Stripe.

← Back to Docs

Support

Getting help with your Axiom Intel instance

Contact Support

For technical issues, billing questions, or feature requests, email us at support@axiomisr.com. Include your instance URL and a description of the issue.

Response Times

Starter Plan

Email support with 24-hour response time during business days.

Professional Plan

Priority email support with 12-hour response time, including weekends.

Enterprise Plan

SLA-bound support with dedicated response commitments defined in your service agreement.

Billing & Account

Manage your subscription, update payment methods, and view invoices through the Stripe Customer Portal. Access it from your account settings within the platform, or contact support@axiomisr.com for assistance.

Enterprise Inquiries

For government procurement, custom deployment requirements, API access, or volume licensing, contact our sales team.

Investigation Credits

Credits fuel your investigations. Each time you launch an investigation, credits are deducted based on the depth and complexity of the mode you choose. Purchase credit packs for your existing Axiom Intel instance.

What Credits Buy

Mode Credits Cycles Sub-Projects Max Depth Best For
Quick 0.5 2 1 1 Rapid background checks, single-entity lookups
Standard 1 3 2 1 Routine due diligence, corporate profiling
Deep 3 5 3 2 Complex investigations, network mapping
Thorough 6 10 5 2 Deep-dive research, multi-jurisdiction tracing

10 Credits

For periodic investigations and ad-hoc research

$19.99
  • 10 investigation credits
  • 10 standard or 20 quick investigations
  • No expiration
  • Use any investigation mode

75 Credits

For teams and high-volume investigation work

$99.99
  • 75 investigation credits
  • 75 standard or 12 thorough investigations
  • No expiration
  • Use any investigation mode

Credits are added to your account instantly after payment. No expiration.
Need a subscription with included credits? View subscription plans