2-OXO-Butyric Acid

Optimal Result: 0 - 0 mmol/mol creatinine.

2-OXO-Butyric Acid is also known as Alpha-ketobutyric acid.

- Alpha-ketobutyric acid results from the breakdown of threonine or methionine during glutathione production.

- Specifically, cystathionine is metabolized to alpha-ketobutyric acid and cysteine.

- a- ketobutyric acid enters the mitochondrial matrix and get converted to propionyl-CoA by the branched chain keto-acid dehydrogenase complex (BCKDHC) and enters the Krebs cycle at succinyl-CoA.

- Evaluate lactate and the branched chain keto acids

- Evaluate alpha-hydroxybutyric acid

- Associated Nutrients: Vitamin B3

- a -Ketobutyric acid is produced from cystine, along with hydrogen sulfide (H2S) as a by-product.

- a- Ketobutyric acid is reversibly converted to a- hydroxybutyric acid.

What does it mean if your 2-OXO-Butyric Acid result is too high?

- Alpha-ketobutyric acid results from the breakdown of threonine or methionine during glutathione production.

- Specifically, cystathionine is metabolized to alpha-ketobutyric acid and cysteine.

- a- ketobutyric acid enters the mitochondrial matrix and get converted to propionyl-CoA by the branched chain keto-acid dehydrogenase complex (BCKDHC) and enters the Krebs cycle at succinyl-CoA.

- Evaluate lactate and the branched chain keto acids

- Evaluate alpha-hydroxybutyric acid

- Associated Nutrients: Vitamin B3

- a -Ketobutyric acid is produced from cystine, along with hydrogen sulfide (H2S) as a by-product.

- a- Ketobutyric acid is reversibly converted to a- hydroxybutyric acid.

10 000+ happy customers
100% satisfaction
★ ★ ★ ★ ★ customer support

Trust us to examine your lab results, guiding you towards improved health.

Use promo code to save 10% off any plan.


We implement proven measures to keep your data safe.

At HealthMatters, we're committed to maintaining the security and confidentiality of your personal information. We've put industry-leading security standards in place to help protect against the loss, misuse, or alteration of the information under our control. We use procedural, physical, and electronic security methods designed to prevent unauthorized people from getting access to this information. Our internal code of conduct adds additional privacy protection. All data is backed up multiple times a day and encrypted using SSL certificates. See our Privacy Policy for more details.