How It Works
Understanding the process behind our AML checks
Step 1: Address and Network Identification
Enter your wallet address and select the blockchain. The system validates the address and prepares a real-time query for that specific network.
Step 2: Database Query
We send a secure request to our AML analytics partners. Their databases contain millions of records of suspicious activity and flagged addresses.
Step 3: Clustering and Link Analysis
The system analyzes not just your address, but all connected wallets to detect links to darknet markets, mixers, or sanctioned entities.
Step 4: Scoring and Report Generation
Our model weighs every risk factor to calculate a final purity score from 0% to 100%, providing a comprehensive yet simple AML report.
Analysis Depth
Surface view vs AML Compliance view
What Do We Analyze?
Our database covers the full spectrum of blockchain activity, categorized by risk level.
Darknet Service
Illegal Markets
Marketplaces for illegal goods, drugs, and stolen data.
CRITICAL THREAT
Sanctions
OFAC Lists
Addresses linked to sanctioned entities and countries (OFAC, EU).
CRITICAL THREAT
Ransom
Extortion
Wallets used by ransomware groups and blackmailers.
CRITICAL THREAT
Stolen Coins
Hacks
Funds stolen from exchange hacks and protocol exploits.
CRITICAL THREAT
Scam
Fraud Projects
Addresses involved in phishing, ponzi schemes, and fraud.
CRITICAL THREAT
Terrorism Financing
Funding of terrorist organizations and illegal groups.
CRITICAL THREAT