Appendix

Appendix 1: Glossary

Entity

The controller of a specified address. For an EOA address, the entity is usually the identity that controls the private key. While for a contract, the entity is usually the deployer or owner with high privileges.

Secondary Entity

The user of a specified address and does not have control of private keys. For example, exchanges distribute addresses to users for depositing. Users can use such addresses to receive payments but can not access the private key.

Name Tag

Serves as a unique identifier for an address.

Address Property

Used to indicate the characteristics associated with an address, such as ‘HOT WALLET’ or ‘BLOCKED BY USDT’.

Entity Property

Used to characterize the attributes exhibited by an entity, such as 'NO KYC' or 'OFAC SANCTIONED'.

Confidence Score

The scoring range is from 1 to 10. By default, only labels with a confidence score above 5 are returned.

Risk Score

The scoring range is from 1 to 5. Addresses with a rating of 4 or higher are deemed to have a significant compliance risk.

Appendix 2: Category of Risk Factors

Risk Category

Description

Risk Score

COMPROMISED

For example, vulnerable contracts, publicly disclosed private key addresses, etc., it is not recommended to interact with such addresses.

4

GAMBLING

An online gambling platform that supports cryptocurrency, offering services such as slot machines and sports/e-sports betting.

4

ATTACKER

The perpetrator of a certain security incident, for example, the attacker's address in the Colonial Pipeline hack.

5

DARK MARKET

Large-scale trading platforms on the dark web that sell drugs, stolen account data, weapons, pornographic materials, hacker services, and more.

5

DARKWEB BUSINESS

Operating a dark web site that involves one or more of the following businesses: drugs, stolen accounts, weapons, pornographic materials, hacker services, etc.

5

ILLICIT INDIVIDUAL / ORGANIZATION

Entities involved in illegal activities such as fraud, hacking, phishing websites, dark web operations, etc., lack accurate identification, but are indicated by intelligence sources.

5

MIXER

Services that obscure the source and destination of funds.

5

RANSOMWARE

Criminal groups that carry out extortion through ransomware.

5

SANCTIONED

Any person within the jurisdiction of the authority issuing sanctions, including nationals operating elsewhere or overseas companies operating directly within the jurisdiction of the issuing authority, shall not engage in business dealings with sanctioned entities.

5

SCAM

Address(es) controlled by a certain fraudster (project), for example, the address(es) of the Plus Token scam perpetrator(s).

5

Last updated