How It Works

Understanding the process behind our AML checks

Phase 01

Step 1: Address and Network Identification

Enter your wallet address and select the blockchain. The system validates the address and prepares a real-time query for that specific network.

Phase 02

Step 2: Database Query

We send a secure request to our AML analytics partners. Their databases contain millions of records of suspicious activity and flagged addresses.

Phase 03

Step 3: Clustering and Link Analysis

The system analyzes not just your address, but all connected wallets to detect links to darknet markets, mixers, or sanctioned entities.

Phase 04

Step 4: Scoring and Report Generation

Our model weighs every risk factor to calculate a final purity score from 0% to 100%, providing a comprehensive yet simple AML report.

Analysis Depth

Surface view vs AML Compliance view

Target
P2P
No-KYC
No-KYC
Airdrop
Scam
DEX
Mule
Dark
Tier-1
Yield
Lidou

What Do We Analyze?

Our database covers the full spectrum of blockchain activity, categorized by risk level.

Darknet Service

Illegal Markets

Marketplaces for illegal goods, drugs, and stolen data.

CRITICAL THREAT

Sanctions

OFAC Lists

Addresses linked to sanctioned entities and countries (OFAC, EU).

CRITICAL THREAT

Ransom

Extortion

Wallets used by ransomware groups and blackmailers.

CRITICAL THREAT

Stolen Coins

Hacks

Funds stolen from exchange hacks and protocol exploits.

CRITICAL THREAT

Scam

Fraud Projects

Addresses involved in phishing, ponzi schemes, and fraud.

CRITICAL THREAT

Terrorism Financing

Funding of terrorist organizations and illegal groups.

CRITICAL THREAT