MetaSleuth Documents
MetaSleuth Documents
MetaSleuth Documents
  • Introduction
  • Media Kit
  • User Manual
    • Getting Started
      • Start by a Simple Search
      • Start by a Shared Chart
      • What are Nodes?
      • What are Edges?
    • Canvas and Panels
      • Canvas
        • Toolbox Overview
        • Better Layout
        • Customize Your Canvas
        • Keyboard Shortcuts
      • Address Panel
      • Edge Panel
      • InterChain Tracker Panel
    • Trace Funds (Ways to Retrieve Transfer Data)
      • Analyze
      • Expand In / Out
      • Load More
      • Advanced Analysis
      • Add Address/Tx
      • InterChain Traker (Trace across Blockchains Automatically)
      • Data Explorer
    • Monitor Fund Movements
    • Save and Share
      • Save Your Work
      • Collaborate with Others
      • Export Data
      • Make Your Work more Readble
        • Memo
        • Labels
        • Custom Watermark
      • Share Your Findings
    • Account and Data Management
      • Account Settings
      • Preference Settings
      • User Data
    • Plans, Billings and Payments
      • Change Your Plan
      • Update Your Payment Method and Billing Infomation
      • Team Plan & Billing
    • Tutorials
      • Crypto Tracking: Starting with a Transaction
      • Advanced Analysis: Lightweight Fund Tracking
  • BlockSec AML API
    • Introduction
      • Authentication
      • Response Format
    • Address Label API
      • APIs
    • Wallet Screening API
      • APIs
    • v2 (retired)
      • Getting Started
        • Authentication
        • Rate Limits
        • Supported Chains
      • API Endpoints
        • Address Label
        • Compliance Score
      • Appendix
  • Connection
    • Twitter
    • Telegram Group
Powered by GitBook
On this page
  • Appendix 1: Glossary
  • Appendix 2: Category of Risk Factors
Export as PDF
  1. BlockSec AML API
  2. v2 (retired)

Appendix

Appendix 1: Glossary

Entity

The controller of a specified address. For an EOA address, the entity is usually the identity that controls the private key. While for a contract, the entity is usually the deployer or owner with high privileges.

Secondary Entity

The user of a specified address and does not have control of private keys. For example, exchanges distribute addresses to users for depositing. Users can use such addresses to receive payments but can not access the private key.

Name Tag

Serves as a unique identifier for an address.

Address Property

Used to indicate the characteristics associated with an address, such as ‘HOT WALLET’ or ‘BLOCKED BY USDT’.

Entity Property

Used to characterize the attributes exhibited by an entity, such as 'NO KYC' or 'OFAC SANCTIONED'.

Confidence Score

The scoring range is from 1 to 10. By default, only labels with a confidence score above 5 are returned.

Risk Score

The scoring range is from 1 to 5. Addresses with a rating of 4 or higher are deemed to have a significant compliance risk.

Appendix 2: Category of Risk Factors

Risk Category

Description

Risk Score

COMPROMISED

For example, vulnerable contracts, publicly disclosed private key addresses, etc., it is not recommended to interact with such addresses.

4

GAMBLING

An online gambling platform that supports cryptocurrency, offering services such as slot machines and sports/e-sports betting.

4

ATTACKER

The perpetrator of a certain security incident, for example, the attacker's address in the Colonial Pipeline hack.

5

DARK MARKET

Large-scale trading platforms on the dark web that sell drugs, stolen account data, weapons, pornographic materials, hacker services, and more.

5

DARKWEB BUSINESS

Operating a dark web site that involves one or more of the following businesses: drugs, stolen accounts, weapons, pornographic materials, hacker services, etc.

5

ILLICIT INDIVIDUAL / ORGANIZATION

Entities involved in illegal activities such as fraud, hacking, phishing websites, dark web operations, etc., lack accurate identification, but are indicated by intelligence sources.

5

MIXER

Services that obscure the source and destination of funds.

5

RANSOMWARE

Criminal groups that carry out extortion through ransomware.

5

SANCTIONED

Any person within the jurisdiction of the authority issuing sanctions, including nationals operating elsewhere or overseas companies operating directly within the jurisdiction of the issuing authority, shall not engage in business dealings with sanctioned entities.

5

SCAM

Address(es) controlled by a certain fraudster (project), for example, the address(es) of the Plus Token scam perpetrator(s).

5

PreviousCompliance Score

Last updated 1 year ago