Appendix
Appendix 1: Glossary
Entity
The controller of a specified address. For an EOA address, the entity is usually the identity that controls the private key. While for a contract, the entity is usually the deployer or owner with high privileges.
Secondary Entity
The user of a specified address and does not have control of private keys. For example, exchanges distribute addresses to users for depositing. Users can use such addresses to receive payments but can not access the private key.
Name Tag
Serves as a unique identifier for an address.
Address Property
Used to indicate the characteristics associated with an address, such as ‘HOT WALLET’ or ‘BLOCKED BY USDT’.
Entity Property
Used to characterize the attributes exhibited by an entity, such as 'NO KYC' or 'OFAC SANCTIONED'.
Confidence Score
The scoring range is from 1 to 10. By default, only labels with a confidence score above 5 are returned.
Risk Score
The scoring range is from 1 to 5. Addresses with a rating of 4 or higher are deemed to have a significant compliance risk.
Appendix 2: Category of Risk Factors
Risk Category
Description
Risk Score
COMPROMISED
For example, vulnerable contracts, publicly disclosed private key addresses, etc., it is not recommended to interact with such addresses.
4
GAMBLING
An online gambling platform that supports cryptocurrency, offering services such as slot machines and sports/e-sports betting.
4
ATTACKER
The perpetrator of a certain security incident, for example, the attacker's address in the Colonial Pipeline hack.
5
DARK MARKET
Large-scale trading platforms on the dark web that sell drugs, stolen account data, weapons, pornographic materials, hacker services, and more.
5
DARKWEB BUSINESS
Operating a dark web site that involves one or more of the following businesses: drugs, stolen accounts, weapons, pornographic materials, hacker services, etc.
5
ILLICIT INDIVIDUAL / ORGANIZATION
Entities involved in illegal activities such as fraud, hacking, phishing websites, dark web operations, etc., lack accurate identification, but are indicated by intelligence sources.
5
MIXER
Services that obscure the source and destination of funds.
5
RANSOMWARE
Criminal groups that carry out extortion through ransomware.
5
SANCTIONED
Any person within the jurisdiction of the authority issuing sanctions, including nationals operating elsewhere or overseas companies operating directly within the jurisdiction of the issuing authority, shall not engage in business dealings with sanctioned entities.
5
SCAM
Address(es) controlled by a certain fraudster (project), for example, the address(es) of the Plus Token scam perpetrator(s).
5
Last updated