What do we analyze?

We analyze addresses for belonging to more than 20 sources of risk to find suspicious transactions and determine the risk factor. We divided all sources into three categories.

Risk Analysis

šŸšØ Be Careful!

The presence of Dark Market, Dark Service, or Illegal Service is a bad sign. We recommend conducting additional investigations not to lose your funds due to blocking.

šŸšø

Child Exploitation

Entities associated with child exploitation.

šŸ›‘

Dark Market

Coins associated with illegal activities.

āš ļø

Dark Service

Coins related to child abuse, terrorist financing or drug trafficking.

āš–ļø

Enforcement action

The entity is subject to legal proceedings with the judicial authorities.

šŸ’ø

Fraudulent Exchange

Exchanges involved in exit scams, illegal behavior, or whose funds have been confiscated by government authorities.

šŸŽ²

Gambling

Coins associated with unlicensed online games.

šŸš«

Illegal Service

Coins associated with illegal activities.

šŸ”„

Mixer

Coins that passed via a mixer to make tracking difficult or impossible.

šŸ’°

Ransom

Coins obtained by extortion or blackmail.

šŸ›”ļø

Sanctions

Entities subject to sanctions.

āŒ

Scam

Coins that were obtained by deception.

šŸ”’

Stolen Coins

Coins obtained by stealing someone else's cryptocurrency.

šŸ’£

Terrorism Financing

Entities associated with terrorism financing.

Suspicious Sources

šŸ§

ATM

Coins obtained via cryptocurrency ATM operator. These transactions often lack full transparency and may be used to convert fiat money into cryptocurrency with minimal traceability.

šŸ¦

Exchange | High Risk

An entity becomes high-risk based on the following criteria: ā€¢ No KYC: Does not require any customer information before allowing deposits/withdrawals. ā€¢ Criminal Ties: Involvement in AML/CFT violations or criminal activities. ā€¢ High Exposure: High-risk exchanges associated with darknet markets or mixers.

šŸ¤

P2P Exchange | High Risk

These platforms allow participants to exchange directly without intermediaries. While convenient, they are often unregulated and used for illicit transactions such as money laundering due to the lack of comprehensive KYC processes.

ā“

Unnamed Service

This category refers to unidentified clusters that resemble the behavior of a service based on large numbers of addresses and transactions. These services may represent emerging or covert operations.

Trusted Sources

šŸ’±

Exchange

The organization allows users to buy, sell and trade cryptocurrencies with trading licenses that include services like depository, brokerage, or other financial services. It does not include licenses for non-specific financial services in non-cooperative jurisdictions. Exchanges account for 90% of all funds sent via these services.

šŸ›’

Marketplace

Legitimate platforms for buying and selling goods or services using cryptocurrency. However, they may also include projects that raise funds through ICOs but fail to deliver on promises.

šŸ’³

Merchant Services

Allows businesses to accept payments from customers, acting as payment gateways or processors. They often convert funds to fiat currency and transfer them to the merchant's bank account.

ā›ļø

Miner

Coins mined by miners but not forwarded yet. This represents the initial stage of cryptocurrency entering the ecosystem.

šŸ“¦

Other

Coins obtained through alternative means like airdrops, token sales, or other methods unrelated to standard transactions.

šŸ”—

P2P Exchange

Platforms allowing participants to trade directly without intermediaries. Licensed P2P exchanges offer legitimate services, though they exclude non-compliant jurisdictions.

šŸ”§

Payment Processor

Handles cryptocurrency payments for services or goods, enabling smooth transactions for both merchants and customers.

šŸ”’

Seized Assets

Crypto assets seized by governments or regulatory authorities, often due to illicit activities or tax evasion.

šŸ‘›

Wallet

Online wallets are used for storing and transacting cryptocurrencies. Custodial wallets hold private keys but may expose users to risks if not managed by reputable providers.