Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
🎉 Welcome to the MetaSleuth User Manual! 🎉
MetaSleuth is a comprehensive platform designed to track and investigate on-chain assets, catering to diverse analysis needs. To facilitate a quick start with this tool, we have included four key topics in the "Getting Started" section:
Start by a Simple Search: Quickly find specific addresses or transactions using the search function to access relevant data and insights.
Start by a Shared Chart: Collaborate and build upon existing visualizations by exploring shared charts created by other users.
Understand the concept of nodes, which represent entities such as addresses or contracts within the blockchain network.
Learn about edges, which illustrate the relationships and transactions between nodes, providing context to the data you analyze.
On-chain investigations serve various purposes. You might be a law enforcement officer tracing illicit funds, a compliance officer assessing a user's financial risk, or an investor checking for potential issues with a project. You may also need to investigate a fraudulent transaction to track where your money went. In any case, the analysis always starts with an address or a transaction.
Using MetaSleuth requires no preparation. Simply visit our website at metasleuth.io. You don’t even need to register or log in; you’ll find the analysis entry point right away—just a simple input box.
You can enter an address, transaction hash, or ENS domain name. If you're unsure what to search for, click the search box to see popular addresses and choose one to start.
The Investigation Toolbox primarily provides filtering and editing capabilities for the data on the canvas. It consists of the following six key functionalities.
Address Filter lists all the analyzed addresses, including those displayed on the canvas and those not displayed on the canvas. Users can search for specific addresses in the filter and adjust their visualization status.
Token Filter lists all the analyzed tokens. If all transfers related to a token are displayed on the canvas, it will be represented as selected (checkbox checked); conversely, if none of the transfers related to a token are displayed on the canvas, it will be represented as unselected (checkbox unchecked). It's important to note that if only some transfers related to a token are displayed on the canvas, it will be represented as partially selected (checkbox indeterminate).
Add Address/Tx allows users to add specific addresses or transactions (intra-asset transfers) to the canvas. For more information, you can refer to the
Sometimes, you may receive a MetaSleuth analysis result shared by someone else, such as . In MetaSleuth, these links are referred to as Shared links. They allow users to view and edit the canvas associated with the shared analysis.
A shared canvas is essentially a snapshot of the analysis results provided by the sharer. When you open a shared link, you see the state of the entire canvas as it was when the link was created. You can click on the edges and nodes to view details, as well as check the sharer's notes. However, keep in mind that this is just one analysis result and does not represent the complete picture.
Clicking on an address node will display details such as the address label, associated tags, risk score, asset balance, and on-chain interactions. It's important to note that the asset transfers shown are only those selected by the sharer to be displayed on the canvas. To view a more comprehensive set of asset transfers, you will need to unlock the canvas for re-analysis.
If you enter an address, wait about 1 second for a dropdown box to appear, showing all the chains where the address has been active. Click on the chain you want to analyze to view the fund flows associated with that address.
For example, if you search for 0x0629b1048298ae9deff0f4100a31967fb3f98962 and select Arbitrum, you can view the fund flow of the Radiant Capital Exploiter on that chain. Note that not all fund transfers will appear on the canvas for readability. To explore what information you can access via the Analyze feature, visit the Trace Funds - Analyze.
If you enter a transaction hash, the dropdown will typically show only one result (assuming the hash is correct). Clicking on it will reveal all the fund flows associated with that transaction. For example, try entering 0x7856552db409fe51e17339ab1e0e1ce9c85d68bf0f4de4c110fc4e372ea02fb1, which is an attack transaction from the Radiant Capital hack event.
When you enter a transaction, MetaSleuth will display all asset transfers that occurred within that transaction. In this case, the attacker drained several pools from the project, so you will see funds coming from multiple addresses into the attacker's address.

Add Memo allows users to add text annotations on the canvas. It enables users to provide additional context, notes, or explanations related to specific addresses & transactions on the canvas. For more information on how to use this feature, please refer to the Memo section.
Custom Watermark allows users to add their own branding or identification to their analysis results. It enables users to customize the watermark displayed on the canvas, adding their logo, name, or any other desired information. For more information on how to use this feature, please refer to the Custom Watermark section.
Search in Canvas allows users to perform searches within the canvas content based on criteria such as blockchain, address, transaction, label, or edge number. It enables users to quickly locate specific elements or connections within the visualization. By entering relevant keywords or criteria in the search bar, users can filter and focus on specific information of interest within the canvas.


Clicking on the edge will show you the asset transfer between the two nodes. Similarly, only the content selected by the sharer will be displayed here.
If you find the shared content valuable and want to continue your analysis, you can unlock the canvas for editing and then save it. Your edits will not sync back to the original sharer.
Unlocking is straightforward—just click on the "Start Editing" button in the top left corner.
Generally, the unlocking process is smooth, but sometimes you may encounter a prompt asking if you want to keep some of the sharer's private tags. If you're an experienced MetaSleuth user, you might want to consider which tags are valuable to retain. If you're a beginner, just select "Import"!
For more information about Private Labels, you can visit the Save and Share - Make Your Work More Readable section.

The Canvas in MetaSleuth is your primary workspace for visualizing and analyzing blockchain data. It includes several key features:
Toolbox Overview: Access a variety of tools designed to enhance your analysis and streamline your workflow.
Better Layout: Enjoy an organized interface that allows for efficient arrangement of visual elements, making your data easier to interpret.
Customize Your Canvas: Tailor the Canvas to fit your needs by adjusting layouts, colors, and other visual settings to improve your analysis experience.
: Utilize keyboard shortcuts to navigate and operate more efficiently within the Canvas, saving you time during your investigations.
In MetaSleuth, edges represent the relationships between the connected nodes (addresses). Currently, there are three types of relationships displayed:
Standard Asset Transfer: The most common relationship type, indicating the flow of assets between two addresses.
Contract Creation Relationship: Represents the relationship between a contract creator and the created contract, labeled as 'Contract Creation'.
Cross-Chain Asset Transfer: This relationship indicates fund interactions between a standard address node and a cross-chain bridge node, typically suggesting that the funds have been transferred across chains. Users can further explore the source and destination of the funds using the InterChain Tracer feature.
In the example provided below, we can simultaneously observe these three types of relationships.
Next, let's examine the information contained in a standard asset transfer edge.
In the example below, the edge from the node Euler Finance Exploiter 2 (0xb66cd) to KyberSwap Exploiter (0x50275e) indicates that Euler Finance Exploiter 2 sent 0.110 Ether to KyberSwap Exploiter.
Please note that MetaSleuth consolidates asset transfers of the same direction and type between two addresses into a single edge. Therefore, an edge does not represent a single transaction.
To see more details about an edge, click on it to open the , then select Detail to view all transaction information.
In the transaction list, you can see that the Euler Finance Exploiter 2 has made two transactions, transferring a total of 0.111 Ether to the KyberSwap Exploiter.
Edges are typically gray by default, but to help distinguish different asset transfers, MetaSleuth uses the primary color of the major tokens' icons from each chain as the edge color. This aids users in better understanding the asset flows.
Users can modify edge colors in two ways:
Change the Color of a Single Edge: Click the canvas icon on the edge.
Change Color for All Edges of a Token: To modify the color of all edges representing a specific token, go to the Token Filters panel in the top left corner. Click the color circle next to the token you wish to change. After selecting your desired color, all edges associated with that asset will update to the new color.
Edge labels consist of three parts:
Index: All edges are sorted by the displayed time, with a smaller index indicating an earlier occurrence.
Time: The earliest timestamp of all transactions included in the edge (the time of the earliest transaction).
Transfer Amount: The total amount of asset transfers represented by the edge (for the selected transactions displayed on the canvas), along with the token symbol.
In MetaSleuth, the Canvas serves as the central workspace where users can visualize and analyze blockchain data. Panels are additional sections that provide detailed information and tools related to the items displayed on the Canvas. We organize it into four sections:
Canvas: The Canvas is the central workspace for visualizing and analyzing blockchain data, enabling interactive manipulation of nodes and edges.
Address Panel: The Address Panel shows detailed information about specific addresses, including transaction history and token holdings.
: The Edge Panel displays the connections between nodes, highlighting transaction flows and relationships.
: The InterChain Tracker Panel monitors cross-chain transactions, allowing users to trace asset movement between different blockchain networks.
Tracking and analyzing on-chain assets often revolve around fund flows, making the layout of the canvas crucial. It not only affects the efficiency of analysis but also impacts the presentation of the analysis results. MetaSleuth has specifically provided a layout adjustment toolbar, which offers the following functionalities:
Manual Layout allows users to manually adjust the position and alignment of nodes on the canvas. Users can drag and reposition nodes to create a customized layout that suits their analysis needs.
Automatic Layout automatically arranges the nodes and edges on the canvas in an optimized layout, enhancing the visual clarity and organization of the fund flow diagram.
Adjust Spacing allows users to globally adjust the spacing between nodes, creating a more compact or expanded layout.
Undo and Redo enable users to manage and revert changes made to the canvas during the analysis process. Please note that there is a limitation on the number of steps allowed for Undo and Redo, which is set to a maximum of three steps.
Center the Graph allows you to align and center the entire canvas, bringing it into view and restoring overall control. This functionality is particularly useful when you want to refocus and have a complete view of the graph without any elements being cut off or hidden.
Full Screen allows you to immerse yourself fully in your analysis and investigation. Give it a try!















Ctrl / Cmd + Z: Undo
Ctrl / Cmd + Shift + Z: Redo
Ctrl / Cmd + F: Search
Ctrl / Cmd + Shift + Click: Multi-Select nodes
Ctrl / Cmd + Shift + Drag: Multi-Select nodes
Investigations can be complex and have multiple entry points. For example, if you want to investigate a case involving four separate addresses, you can add them to the canvas using this feature.
When you add addresses, they will be placed on the canvas without any immediate analysis, allowing you to perform analyze, expand, or load more operations later. On the other hand, when you add transactions, MetaSleuth will retrieve the inner asset transfers of those transactions and display them all on the canvas.
When clicking on any edge on the canvas, an edge list panel will expand.
In this panel, you can view all asset transfers between two addresses (based on the currently available data). Each edge is uniquely identified by (from, to, asset). To view specific transfer data, you need to click on "Detail" to enter the Transaction List Panel. For example, clicking on (Poloniex 4, Poloniex Exchange Exploiter, Ether) in the above example would allow you to view all transaction details on the canvas involving the transfer of Ether from Poloniex 4 to Poloniex Exchange Exploiter, as shown below.
The fund flow in MetaSleuth consists of nodes and edges, where the "nodes" represent addresses on the blockchain, also referred to as wallets or accounts.
There are two types of nodes on the MetaSleuth canvas:
Standard Address Nodes: These are displayed as rounded rectangles.
Resolvable Bridge Nodes: These are represented as octagons.
To access the account settings page, click the User avatar icon on the top right corner, then Account Settings.
In account settings, users can:
Update username (alias)
Reset password
You can export the relevant data, such as transaction details, asset transfers, or analysis results, in a suitable format. MetaSleuth supports various export options, including CSV and PNG, depending on your needs.
To facilitate the process of tracking funds for users, MetaSleuth has a built-in InterChain Tracker. The InterChain Tracker automatically identifies potential cross-chain asset transfers when users analyze addresses. It also provides a one-click tracking feature to trace the cross-chain asset transfers on the other side. For more information on how to use it, you can visit the .
Currently, MS supports automatic parsing of cross-chain bridges such as Across, Multichain, cBridge, Hop, PolyNetwork, Stargate, Synapse, WormHole, Optimism Gateway, Polygon Pos Bridge, Avalanche Bridge (partial support), and RenBridge (partial support).
For further information on bridges and cross-chain transfers, please visit .
The Load More feature provides you with complete control over selecting the data to display on the canvas. It retrieves asset transfers for a target address but does not automatically paint them. You can carefully select the ones you want to show by examining the name tag, risk information, interaction direction, and other details in the Address Panel.
You have the option to upload your watermark and place it anywhere on the canvas. Additionally, you can attach a hyperlink to your watermark, allowing it to direct viewers to your website.
In MetaSleuth, effective account and data management is essential for a personalized experience. This section includes:
Manage your account details, including password changes and security options to ensure your account remains secure.
Customize your user experience by adjusting settings such as notification preferences, display options, and language choices.
Access and manage your data, including viewing your activity history and exporting relevant information for your records.
MetaSleuth offers a range of plans for user selection. For specific plan details, please refer to: .
We also provide two payment options: Card and Crypto. Users can manage their subscribed plans and billing information below:
: Quickly adjust your subscription plan to fit your needs, whether upgrading or downgrading.
: Easily update your payment details to ensure uninterrupted service and avoid payment issues.
MetaSleuth uses Stripe to process card payments and subscriptions, so we don't collect or store your card information.
To update your payment method, click the User avatar icon -> Subscription -> Manage Billing. From there, you can change the payment method on the Stripe hosted page.
Same as the payment method, click the User avatar icon -> Subscription -> Manage Billing to update billing information.
You can change the name, email, address, phone number and tax infomation here.
Turn on/off 2FA verification
Set up 2FA authentication







MetaSleuth offers three different Team Plans for you to choose from, which you can explore at: https://metasleuth.io/plans.
Please note that team Plan subscriptions do not accept crypto payments.
Team Plans in MetaSleuth are based on seats, which represent the number of individuals who can join your organization. For example, if you have 10 seats and 6 are occupied, you can add 4 more individuals.
MetaSleuth charges for all seats on your account, regardless of whether they are being used. For instance, if you have 5 seats and 4 active users, you will be billed for all 5 seats, even if one seat is unfilled.
Team admins can increase or decrease the number of seats by clicking on "Update Seats" in the billing section of the Team settings. Please note that the total number of seats cannot be less than the number of occupied seats.
If you add seats or upgrade your team plan, the additional costs will be applied immediately to your current billing period.
When you remove seats or downgrade your plan, these changes will take effect in your next billing cycle.
Feel free to reach out us at [email protected] if you have any questions or need further assistance!
To enhance the clarity and presentation of your analyses, MetaSleuth offers several features:
Memo: Add notes to your visualizations to provide context or explanations for specific data points, making it easier to remember key insights.
Labels: Use labels to identify and categorize different elements within your workspace, allowing for quick recognition and organization of your data.
Custom Watermark: Personalize your visualizations with a custom watermark, which adds a professional touch and helps maintain ownership of your work.
You can upgrade your plan at any time by visiting the Pricing page, selecting your desired plan, and clicking "Upgrade."
When upgrading to a higher plan mid-billing cycle:
You will be charged immediately for the new plan.
The amount due will be prorated based on the remaining time in your current billing cycle.
The new plan takes effect immediately, and the billing cycle remains the same.
If you switch to a longer billing interval:
You will be charged immediately for the new plan.
The amount due will be reduced by a prorated amount based on the time remaining in your previous billing period for your current plan.
The new plan takes effect immediately, and the billing cycle changes right away.
Currently, MetaSleuth does not provide the option to downgrade while an active subscription plan is in effect. If you need to downgrade, we kindly ask that you cancel your current subscription first and then resubscribe after the current billing cycle.
Your MetaSleuth subscription, whether monthly or annually, will renew automatically until you cancel it.
You can cancel anytime by clicking User avatar icon -> Subscription -> Manage Billing.
On the Stripe page, click Cancel subscription to unsubscribe. After you cancel, you’ll still have access to all the paid features until the end of your billing cycle.

Address nodes on the canvas typically have two states.
Reading State: The default state of the node, shown on the left, which provides only readable information.
Analyzing State: The state that appears on the right when you hover your mouse over the node, offering various analysis functions.
In addition to the two basic states mentioned above, you may also see various useful icons on the nodes (as shown in the image below). We will introduce these icons one by one.
Blockchain
No
Entity logo
When an address is associated with an entity that has a logo, the entity's logo will be displayed on the node. This helps to visually identify the organization or project linked to that address.
No
Address Info
No
Address label
Address labels are displayed in the following order: user private labels > BlockSec labels. If neither is available, no label will be shown.
When MetaSleuth identifies that an asset transfer likely involves cross-chain activity, it links that transfer to a bridge node. The specifics of the interaction address, including the chain, address, and label, are omitted, and instead, a bridge logo and name are used to represent it.
Clicking on a bridge node allows you to view the specific interactions, including detailed asset transfers, transactions, and the bridge address involved. You'll also see a Track button; clicking this will enable MetaSleuth to automatically analyze the cross-chain destination of the funds.
To access the user data management page, click the User avatar icon on the top right corner.
This section includes the private name tag of addresses and private notes of transactions. All private labels are displayed in a table list format, where users can search, edit, and export labels.
In this section, users can access all saved charts, and options to search, delete, and edit are available.
In this section, users can access all shared links, with options to delete, edit expiration time, and edit information. Please note that shared links are snapshots of charts, and edits cannot update the content of a shared link.
Once you have conducted your analysis and gathered relevant information, it is essential to compile your findings in a comprehensive manner. MetaSleuth has some great features to help you compile your findings effectively.
When you come across words that can enhance understanding of the charts and the underlying story, simply utilize the Memo feature.
During the analysis process, you can add private labels to addresses and transactions to record your own understanding of the specific address or transaction. These private labels serve as personal notes or annotations.
In contrast to private labels, MetaSleuth also provides default public labels supported by the BlockSec Address Label Library. These public labels offer standardized and publicly recognized tags for addresses, helping you gain additional insights or information about specific addresses or transactions.
Looking for specific direction tracking? Use Expand, the single-direction version of Analyze.
To access the preference settings page, click the User avatar icon on the top right corner, then Preference.
The settings in the chart settings will affect how the canvas is displayed globally.
This setting primarily applies to the display of token amounts within the canvas.
The Standard Format (e.g., 1,099,999.99 Ether) is the default display format.
The Abbreviated Format (e.g., 1.099M Ether) can shorten the displayed text, making the layout within the canvas more compact in certain situations.
When you turn on this setting, the fund flow will deselect (not display in canvas) those edges which contain suspicious token transfers by default.
For suspicious tokens: We assess token reputation through analysis of on-chain activity and relevant information. If you discover any inaccuracies, please contact us to report them.
You can customize your watermark and manage the display of the MetaSleuth watermark here.
You can upload a logo or image to create a custom watermark that represents them or their organization. You can also add a URL link to the uploaded watermark, which allows others to visit the link when clicked. After uploading, you can add this custom watermark to their charts to identify your work. This feature is available to subscribers of the Pro Plan and higher.
Subscribers to the Pro Plan or above have the option to remove the MetaSleuth Watermark from their Canvas. By turning on the switch, the watermark can be removed globally.
Subscribe to our plan to use this API in your service to help meet the compliance requirements and save users' assets.
When tracing funds, the appearance of a cross-chain bridge node on the canvas indicates cross-chain transfers. To explore further, simply click on this bridge node or the connecting edge to open the InterChain Tracer Panel.
The illustration below shows an example of the InterChain Tracer Panel. Here, the ExactlyProtocol Exploiter is depicted using the Across bridge to transfer Ether from the Optimism network to the Ethereum blockchain.
Within the InterChain Tracker Panel, each entry represents a cross-chain transaction, providing key details such as the source and destination transactions, as well as the assets transferred. If cross-chain relationships have not yet been traced, information will only be available on either the source or destination side.
Are you wondering how to discover transactions on the respective chain? Which chains and addresses are involved in sending or receiving? By clicking "Track," users can utilize MetaSleuth's automated cross-chain tracking capabilities. Once the analysis is complete, cross-chain asset transfers on the other side will be displayed in the panel and automatically highlighted on the canvas.
If you encounter any unsupported, inaccurate, or failed cross-chain resolutions, we encourage you to provide feedback by selecting the "Report Bug" option located in the bottom right corner of the panel. Your input is invaluable in helping to enhance the tracking experience!
In MetaSleuth, users can utilize the following features to efficiently and effectively trace funds:
: Examine transaction details and patterns to gain insights into fund flows.
: View incoming and outgoing transactions to understand the movement of assets.
: Retrieve additional transaction data to ensure a comprehensive overview.
In MetaSleuth, the "Save and Share" feature enhances your workflow by allowing you to:
: Securely store your analysis and visualizations for future reference.
Easily share your findings with team members or stakeholders to foster collaboration and discussion.
: Export your data and insights in various formats, making it convenient to present your work.
View, filter and select transfer data.
To improve how we collect and present data, we limit the number of records shown by features like Analyze. Usually, we display only the most recent few hundred transfer records. While these limits can make tracking and analysis harder, we have introduced the Data Explorer feature to help.
In the address panel, we now show the number of transfers we have retrieved and the total number of transfers available. This helps you understand the data retrieval status for each address and make better decisions about what to do next.
Introduction to BlockSec AML API
The BlockSec AML API Service offers two main sets of APIs, providing services for and , respectively.
Users who subscribed to the API service before May 6th should visit to access the docs for the previous version of the API. We will continue supporting the old API version until July 1st 2024, so kindly migrate your relevant projects to the new version before that deadline.
The API key remains valid and can be used across both versions.
When your HTTPS request is successful, you will see the following four main fields in each response.
Advanced Analysis: Utilize advanced tools for deeper insights into complex transactions.
Add Address/Tx: Easily incorporate specific addresses or transactions for targeted analysis.
InterChain Tracker: Track funds across different blockchain networks for a holistic view of asset flows.
Data Explorer: View, filter and select transfer data.
Make Your Work More Readable: Organize and format your outputs to improve clarity and presentation, ensuring your analysis is easily understandable.
Share Your Findings: Effortlessly share your results with others to facilitate discussions and decision-making.













When you find the transfer you are interested in, you can click the icon to add that transfer to the canvas. You can also select multiple transfers to add them all at once.


GET
POST
(in )
POST
GET
GET
POST
The rate limit for each API request is five requests per second, and each subscription plan limits the number of addresses that can be queried daily. See our subscription page for more details.
Include the "API-KEY" header in the HTTP Request Headers for each API request, and provide your API key as the value. See the following example.
curl -L \
-X POST \
-H 'Content-Type: application/json' \
-H 'API-KEY:$API_KEY' \
'https://aml.blocksec.com/address-label/api/v3/labels' \
-d '{"chain_id":1,"address":"0x00d7e7409bfe09a736d3e993de9b87d0baa314d5"}'data
-
Detailed results. This field is different according to each request. Please refer to the doc of each endpoint to get the details.
200000
Success
400001
Unauthorized operation
400002
Request rate is too high. Please try again later.
400004
Invalid params
400005
User does not exist
400006
Server busy
request_id
String
The unique id for the current request. If you have any questions or concerns regarding the results of this request, please send us the request ID for review.
code
Integer
The request's status code. A code of 200000 indicates a successful request, while other codes indicate errors. The table below provides a comprehensive list of codes and their meanings.
message
String
Information regarding the code.
No but user can use to edit
Common tool links
These links allow you to quickly jump to the details page for the current address on the respective platform. Clicking on them will provide you with more information about the address's activities and status.
No
Incomplete Data Indicator
This indicates that the data for the current address is incomplete. Analysts requiring full data integrity should take note and may need to use additional methods to obtain complete information.
No
Risk Indicator
This indicates that the address is associated with risky behavior, and users should be cautious when interacting with it. Specific risk details can be found in the address panel.
No
Analyze Button
Yes. Clicking the Analyze button initiates a detailed analysis of the current address.
Analysis Completed
No. Completion of the analysis indicates that the basic analysis is finished. Users can still perform additional analyses, such as Advanced Analyze or Load More to access further data.
Advanced Analyze Button
Yes. Clicking the Advanced Analyze button enables you to perform a detailed analysis of the current address, allowing you to specify parameters such as token type, time frame, and amount.
Private Label (Edit Address Label)
Yes. Users can add or modify a label for an address, which will be stored as a private label in their user data.
Delete Address Node
Yes
Unidirectional Analysis
Yes. Click the button on the left side of the node to analyze the source of funds, and click the button on the right side to analyze the destination of funds.







MetaSleuth Address Monitoring is designed to provide real-time tracking of fund inflows and outflows at specific addresses. We strive for comprehensive monitoring coverage and high availability through the following optimizations:
Multi-Chain Support: We support major blockchains including Ethereum, BSC, Solana, Arbitrum, Polygon, Optimism, Avalanche, and Fantom, allowing users to monitor activities across multiple chains.
Multi-Asset Monitoring: We cover the majority of asset types on these chains, enabling users to track a variety of digital assets they care about.
Flexible Rule Configuration: Users can set precise monitoring rules to track asset transfers, minimizing unnecessary notifications and distractions.
Easy Management: Users can easily create, pause, resume, and delete monitoring rules, allowing for flexible management of their monitoring targets.
Timely Notifications: To ensure users are promptly informed of asset transfers, we offer an email notification service, ensuring no important updates are missed.
For EVM-compatible chains, this service supports monitoring native tokens and assets that comply with mainstream token protocols (e.g., ERC-20, ERC-721, BEP-20) for any address. For the Solana chain, it supports monitoring native tokens and any specified SPL tokens.
To achieve precise asset transfer monitoring, users can configure rules based on token type, direction, and amount:
Token Specification: Users can specify tokens down to the protocol level (e.g., native, ERC-20, ERC-721, BEP-20) and specific tokens (e.g., designated USDC contract address).
Direction Options: Monitoring can be set for incoming (IN), outgoing (OUT), or both (ALL) transfers.
Amount Range: Users can specify a range for the amount of tokens to monitor. The minimum value for fungible tokens is set at 0.001, with no upper limit.
Configured monitoring rules can be viewed in the Dashboard. The displayed information includes monitoring targets, operational status, creation time, restart time (if paused), and the number of events that met the criteria during monitoring. Users can perform actions on monitoring tasks, including pausing, restarting, editing, and deleting.
In the Dashboard, users can view all events related to a monitoring task. An event typically represents an asset transfer and includes information such as the transaction time, transaction hash, direction of transfer, counterpart, asset, and amount. If users have configured their email and enabled notifications, they will receive email alerts for these events.
The default analysis feature of MetaSleuth. In addition to retrieving basic asset transfer data, Analyze incorporates intelligent techniques to facilitate the user's analysis process. Therefore, we also refer to it as "Intelligent Analysis."
You can access the Analyze feature in two main ways: through the search box on the homepage or by selecting an address node on the canvas.
400007
Invalid API key
400008
Invalid auth format
400009
The API key is expired
400010
404 not found!
400011
Invalid address. Please ensure that you have provided the correct chain and address.
400012
Daily request limit exceeded. Please try again tomorrow.
400013
Invalid params. Unsupported chain name
500000
Internal error








When analyzing a transaction, MetaSleuth displays all the asset transfers that occur within the transaction on the canvas.
The currently supported chains for transaction analysis include Bitcoin, Ethereum, Solana, BSC, TRON, Arbitrum, Polygon, Optimism, Avalanche, Base, Fantom, and Linea.
Analyzing addresses involves a more complex algorithm. When analyzing an address, MetaSleuth applies intelligent search and filtering techniques to enhance the efficiency of data retrieval and presentation.
Recent asset transfers: Analyze retrieves information about the most recent asset transfers associated with the address (small amounts will be filtered out). If a transfer is identified as a cross-chain transfer, you can utilize the "InterChain Tracker" to locate the bridged assets. For more details, please refer to the InterChain Tracker section.
Critical paths: Analyze also provides information about reachable paths within two hops between the address and centralized exchanges or mixers. Currently, this feature is only supported for Ethereum.
Not all retrieved data is displayed on the canvas. There are certain data types that we prioritize for display:
Interactions with high-risk addresses.
Interactions with centralized exchanges, mixers, and cross-chain bridges.
The earliest and latest interactions.
Interactions with known entities.
Contract creation relationships.

Users can join a team to collaborate, sharing data such as labels, saved charts, shared links, and monitors within that team. Each user is restricted to being a member of just one team.
To start collaborating, create a team first. All teams need a subscription.
Click 'Create a New Team', set up your team information, and select a plan to begin.
Team admin can invite other MetaSleuth users to join Your Team from the 'My Team' section in the Team settings.
Each team member can have one of the following roles:
👀 Viewer: Can view data in the Team Workspace, including labels, charts, and monitoring data. Does not use a seat in the Team.
✍️ Editor: In addition to the above, can create, edit, and delete team data, use Team Plan features for investigation.
⚙️ Admin: In addition to the above, can manage the team and its members. The Admin role is exclusive to the team creator.
The team admin can manage team members on the team settings page, where they can invite or remove team members and modify their roles.
Data created by users within the team context is automatically saved in the team workspace, accessible to all team members. Within this shared workspace, team members can collaborate, viewing and editing data according to their role-specific permissions.
After joining a team, users can share data from their personal accounts with the team. Users can share their address labels, saved charts, shared links and monitors with the team for collaboration.
Sharing data with the team is equivalent to duplicating a copy of the data within the team. Changes made to the data in personal and team contexts do not impact each other.
As a team member, you can switch between personal and Team contexts. Labels and charts created in the team context are owned by the team, not you personally.
Individual and team subscriptions are distinct. Switching contexts alters your permissions and credit usage. In the individual context, you access personal plan features and spend personal plan credits. In the team context, you utilize team plan features and credits.
Advanced Permission gives teams more control over access management by enabling custom roles and fine-grained permission settings. With this feature, Admins can create roles with specific permissions and assign them to team members—ensuring each person has access to exactly what they need, and nothing more.
This feature is designed for teams with complex collaboration needs, offering flexibility beyond the default role-based access.
Availability: Advanced Permission is available exclusively for the Team Ultra Plan.
Only Admins can enable or disable Advanced Permission.
To enable:
Go to Settings → My Team.
Toggle on Advanced Permission.
Once enabled:
All default roles and permissions will be disabled.
The Admin must manually create roles and assign them to each member.
Members without a role assignment will have no access until assigned.
To disable:
Toggle off the feature in the same location.
Default roles and permission settings will be restored.
Admins can define roles to manage access to various features within the team workspace.
To create a role:
Go to the Role List section.
For each role, configure permissions for the following features:
Labels
Viewable: Can only view all labels in the team workspace.
Editable: In addition to the above, can also add、edit、delete labels.
All data: Can edit all labels, no matter who created.
Data related to member himself
No Permission: No access to saved charts.
Viewable: Can only view all saved charts in the team workspace.
Editable: In addition to the above, can also add、edit、delete saved charts.
All data: Can edit all saved charts, no matter who created.
No Permission
Viewable
Editable
All data
Monitors
Viewable: Can only view all monitor data in the team workspace.
Editable: In addition to the above, can also add、edit、delete monitor data.
All data: Can edit all monitors, no matter who created.
Data related to member himself
Investigations
Allowed: The member can access or use all basic and advanced investigation features.
No Permission: The member cannot access investigation features at all.
Once roles are created:
Go to My Team.
Assign a role to each member.
Each member can be assigned multiple roles.
Permissions from multiple roles will be merged, and the member will receive the highest permission level available across all assigned roles.
Role changes take effect immediately.
In this tutorial, we will describe the fund-tracking functionality of MetaSleuth. During the investigation, we usually want to track the outgoing funds from an address. MetaSleuth facilitates this process by supporting tracking fund flow from one direction.
In the following, we show a real example of tracking the phishing victim to demonstrate this functionality. The address tracked is ryanwould.eth (0xc6D330E5B7Deb31824B837Aa77771178bD8e6713).
From its inception, MetaSleuth aimed to provide analysts with more convenient visual analysis capabilities. After immersing in the on-chain sleuth group and Web3 community, we discovered that one of the most common tasks is tracking outgoing funds from a specific address within a defined time range.
After organizing the fund flow, utilizing memos to note details, and even adding your personal watermark, it's time to share your findings with others. You might want to share it with the media to open-source your findings or with other investigators to further the investigation.
MetaSleuth facilitates this through the 'Share Chart' feature, allowing you to easily share your analysis with others to explore the current canvas content, delve into details, and even continue editing it.


Data related to member himself: Can edit saved charts created by himself.
Data related to member himself




For instance, this involves tracking stolen funds from a victim's address to recover the funds, monitoring the targets of smart money for better investments, and tracking suspicious transactions for anti-money laundering (AML) purposes.
However, the fund flow from these active addresses can be extremely complex, involving multiple tokens, diverse targets, and spanning long periods. This situation does bring troubles for on-chain sleuths who must spend time extracting relevant information for their analysis.
To solve this problem, MetaSleuth has provided the most lightweight/ best user experience/ fastest solution plan among all the assistant tools.
When investigating a phishing case, the information we have is as follows.
ryanwould.eth (0xc6D330E5B7Deb31824B837Aa77771178bD8e6713) has suffered considerable losses in phishing. And furious on-chain sleuth tasked with finding out where stolen funds are going and uncovering hidden phishing groups.
Known Clues
Victim:ryanwould.eth (0xc6D330E5B7Deb31824B837Aa77771178bD8e6713)
Time: around 2023.02.25-2023.02.27
Loss Assets: unknown token, unknown amount
Network: Ethereum
Visit metasleuth.io, select the corresponding blockchain network (the default is Ethereum), and enter the origin address of the funds, i.e., ryanwould.eth.
Metasleuth will resolve the corresponding address based on the ENS name. Then, on the search box's right side, use Metasleuth's core function, Advanced Analyze.
After entering the Advanced Analyze Settings panel, we can choose the funds' direction and the time range. In this task, we only focus on the outflow of funds (out) and the time period around the fishing occurred (2023-02-25->2023-02-28). After completing the configuration settings, we click apply and press Enter to enter the canvas.
That's great! Metasleuth.io quickly generates a visual graph of all outgoing fund flows between February 25, 2023, and February 28, 2023. Thanks to this function, we save a lot of data sifting time.
Moreover, leveraging the address label maintained by MetaSleuth, we can readily identify that within this brief timeframe, only two unusual fund flows were detected, both directed toward the address "Fake_Phishing11227". These anomalous transactions involved 1,842 USDC and 519,351 DATA tokens, as depicted in the graph.
For better display, we open the token configuration item, remove other default tokens, leaving only the stolen tokens (USDC, DATA), and then confirm our changes.
The fund flow becomes extremely concise and clear. To trace the fund outgoing, we further extended the second hop of the fund transfer. In the second hop of the fund transfer relationship, we found that the phishing address "Fake_Phishing11227" transferred the stolen funds to Airswap and exchanged tokens through Airswap.
Due to our token filtering configuration, we only focused on DATA and USDC, which obscured the process of token swapping. To address this, we added ETH to the token configuration and added the swap transaction (0x23f4ed07e2937c3f8f345e44ce489b8f83d2b6fdbf0697f6711ff4c7f2a55162) again. With this update, we now have a complete view of the token-swapping process. The phishing actor exchanged USDC and DATA tokens through AirSwap and obtained 14.58 ETH. At this stage (2022-02-27 22:30), solely focusing on USDC and DATA would no longer be meaningful. We need to trace the path of the acquired ETH to uncover additional phishing addresses.
Therefore, we continued with the Advanced Analysis of the phishing address "Fake_Phishing11227". Similarly, we only focus on the outgoing funds, and the time range between February 27, 2023, and February 28, 2023. We proceed by clicking the "Analyze" button to proceed with the analysis.
We have obtained the fund destinations from "Fake_Phishing11227" within the specified time range. It appears that there are numerous receiving addresses involved, indicating a process of distributing the illicitly obtained funds.
Among all the recipients, the addresses "offtherip.eth", "Fake_Phishing76579", and "Fake_Phishing7064" received the majority of the distributed funds, amounting to 10.36 ETH, 8.36 ETH, and 1.85 ETH, respectively.
Based on this distribution ratio, we regard offtherip.eth as the most suspicious entity in this investigation and attract attention.
With obtaining the unusual address "offtherip.eth", further steps may require utilizing non-blockchain techniques, such as social engineering analysis. However, in this analysis focused on on-chain fund transfers, metasleuth.io has provided a plethora of convenient technical assistance, enabling the entire analysis to be completed in less than 10 minutes.
In this tutorial, we show an example of using MetaSleuth to track a phishing victim's fund flow. The summary of the analysis is as follows.
Victim: ryanwould.eth (0xc6D330E5B7Deb31824B837Aa77771178bD8e6713)
Time: 2023-02-27 22:00
Loss Assets: 1,842 USDC, 519,351 DATA
Network: Ethereum
Funds Target:
First Hop: Fake_Phishing 11227
Second Hop:
offtherip.eth
Analysis Time consumed: <10 min
In this tutorial, we will guide you through the basic functionalities of MetaSleuth by tracing the stolen funds in a phishing transaction. Together, we will explore how to use MetaSleuth to analyze transactions, track specific funds, and monitor untransferred funds.
We have identified a phishing transaction on the Ethereum network with the hash 0x2893fcabb8ed99e9c27a0a442783cf943318b1f6268f9a54a557e8d00ec11f69. Now, let's delve into our analysis.
To begin, navigate to https://metasleuth.io/. Choose Ethereum as the network, and enter the transaction you wish to analyze. Press Enter. Now, await the data returned by MetaSleuth.
Once the transaction analysis is complete, you will be directed to the MetaSleuth analysis page, where you can see all the asset transfers that took place in the transaction. If the analysis target is an address, the displayed information will be more complex. We will cover address analysis in a separate tutorial.
In addition to the central asset transfer graph, the page includes various other functional components. Here is a simplified diagram, and you are encouraged to explore their specific usage during the analysis process.
The transaction we are focusing on involves only one asset transfer: Address 0xbcd131, which is the victim, transferred 2586 MATIC to Fake_Phishing180627.
To continue tracking the destination of the stolen MATIC tokens, it's straightforward. Simply select the Fake_Phishing180627 address node and click on the "+" button on the right side of the node.
This feature is called Expand outgoing and allows you to trace the assets sent from this address. In most cases, this feature provides the desired data. However, for addresses with a high transaction volume, you may need to utilize advanced features such as Advanced Analyze and Load More to obtain the required data.
After clicking the "+" button, we can see numerous outgoing Ether transfers from Fake_Phishing180627. But what about the MATIC we want to track?
MetaSleuth does not display all the data it retrieves on the canvas to ensure a clean and readable representation of the overall fund flow. However, MetaSleuth provides various tools to help users locate the desired data and add it to the canvas. In this case, we can utilize the Token Filter to add all the MATIC asset transfers obtained by MetaSleuth to the canvas.
After confirming, we can see an additional MATIC transfer on the canvas, originating from Fake_Phishing180627 and going to Uniswap V3: MATIC. This is exactly the stolen funds we are tracking.
When it comes to assets sent to decentralized exchanges (DEX) like Uniswap, our focus is not on the MATIC tokens transferred out from the address Uniswap V3: MATIC, but rather on the assets obtained by Fake_Phishing180627 through the swap action on Uniswap.
So, what assets did Fake_Phishing180627 receive through this swap? Let's investigate this swap transaction to find out.
First, we need to determine the transaction to which the MATIC transfer from Fake_Phishing180627 to Uniswap V3: MATIC belongs. Click on the asset transfer edge on the canvas, and in the Edge List that appears below, click on Details to access the Transaction List. Find the transaction hash for this transfer and copy it.
Then, we can add this transaction to the canvas using the Add Address / Tx functionality located in the top left corner of the canvas. This will allow us to explore the asset transfers that took place within this transaction and gain a clearer understanding of its contents.
After adding it, all the asset transfers within this transaction will be visible on the canvas. It becomes clear that Fake_Phishing180627 swapped MATIC for 0.944 Ether through Uniswap. This 0.944 Ether is the asset we need to track further.
Among the various Ether transfers originating from Fake_Phishing180627, which ones should we track?
By clicking on Fake_Phishing180627, you can observe the asset transfers associated with this address in the left-hand address panel. You might have noticed that there is more data available here compared to what is displayed on the canvas (as mentioned earlier, MetaSleuth emphasizes simplicity and readability in the fund flow diagram and does not show all data by default).
The transaction where Fake_Phishing180627 swapped MATIC for Ether occurred on 2023-06-18 at 14:57:11. Therefore, our primary focus should be on Ether token transfers that occurred after this specific time. To filter the data, we can utilize the filter function.
Within the filtered results, it is evident that approximately 6 minutes after the swap action, 1.4 Ether was transferred from the address Fake_Phishing180627 to the address 0x8bae70. This transfer likely contains the funds we are seeking to trace.
We can mark and display them on the canvas, continuing to track the assets of 0x8bae70. By doing so, we can observe that the funds eventually settle in the address 0x8de345
To stay informed about the funds that have not been transferred yet, we can actively monitor them. By enabling monitoring, you will receive email notifications whenever relevant asset transfers occur. To explore additional monitoring features, please visit the MetaSleuth Monitor Dashboard at: .
Although this was a brief exploration, we hope that MetaSleuth has provided you with a convenient and smooth tracking and investigation experience. We will release more instructional material in the future and welcome your suggestions. Join our Telegram group at .
.
What's MetaSleuth
MetaSleuth is a crypto tracking and investigation platform. It can help monitor market movements, track fund flow of criminal activities, and DYOR to avoid scams.
🕵️ Everyone can become a sleuth in the crypto world and DYOR!
Intelligent analysis: MetaSleuth will automatically give you the most valuable interactions based on our Intelligent analysis engine for a given address.
Cross-chain analysis: MetaSleuth supports cross-chain analysis, e.g., a token transfer from BSC to Ethereum through a bridge. All the cross-chain addresses are shown on one map.
Sharing of the Analysis: The result can be shared (with others). Other users can further analyze the shared result, creating a collaborative community.
Enhanced labels: MetaSleuth leverages BlockSec's address labeling system, providing enhanced labels of CEXs, scammer and hacker addresses, and other addresses we collected and verified.
, , , , , , , , , , , , ,
We value your input and would greatly appreciate any feedback or suggestions you may have. Please feel free to contact us through the social media channels listed below.
Telegram:
Twitter:
Email: [email protected]
When you click on an address node, an address panel will expand from the left side of the canvas. In this panel, you can see the following information:
Name Tag: If an address has a public name tag supported by BlockSec or a private name tag assigned by a user, it will be displayed. For example, the "Poloniex Exchange Exploiter" in the image below.
Compliance Risk Score: The compliance risk of an address is evaluated based on the tag information associated with the address and its interaction with other addresses. It is assessed on a scale of five levels: No Risk, Low Risk, Medium Risk, High Risk, and Critical Risk.
Address Labels: The labels associated with an address are provided by the BlockSec AML team. For example, in the given example, the address carries the label "Attacker." Other common labels include CEX, DEX, Sanctioned, Compromised, and more. These labels are used to identify specific characteristics or risk factors associated with the address, aiding in compliance and risk assessment.
Balance
Customization: Users can customize address labels and add notes to addresses and transactions.
Fake_Phishing76579
Fake_Phishing7064









Related Address: These are the addresses that have interacted with the target address, compiled based on the acquired transaction data. In addition to the addresses themselves, you can also view the risk score of each address, the direction of fund flow, and the types of assets involved in the flow.
Transfers: These are all the fund transfers related to the target address that have been obtained.
Load More: This feature allows users to request more transactions for the current address. For detailed instructions on how to access additional transaction data using this feature, please refer to the "Load More" section.
Address Panel Filter: When there is a large amount of interaction in an address, a filtering tool may be needed to narrow down the scope of the investigation.
Add your api key in header (API-KEY) for authentication
A successful resquest
A successful resquest
A successful resquest
A successful resquest
Chain ID. Please refer to the 'Supported Networks' section for specific IDs.
The specific address you want to query. EVM addresses are case-insensitive, while non-EVM addresses are case-sensitive.
Whether to calculate the interaction risk of the queried address.
A successful request
A successful request
GET /address-compliance/api/v3/chain-list HTTP/1.1
Host: aml.blocksec.com
API-KEY: text
Accept: */*
{
"request_id": "a11b2d3cf7834e0f",
"code": 200000,
"message": "Success",
"data": [
{
"chain_id": -3,
"chain_name": "SOLANA",
"support_interaction_risk": true
},
{
"chain_id": -2,
"chain_name": "TRX",
"support_interaction_risk": true
},
{
"chain_id": -1,
"chain_name": "BTC",
"support_interaction_risk": true
},
{
"chain_id": 1,
"chain_name": "ETH",
"support_interaction_risk": true
}
]
}GET /address-compliance/api/v3/risk-items HTTP/1.1
Host: aml.blocksec.com
API-KEY: text
Accept: */*
{
"request_id": "701ade74594943b2",
"code": 200000,
"message": "Success",
"data": [
{
"name": "DARKWEB BUSINESS",
"code": 5001
},
{
"name": "CHILD ABUSE MATERIAL",
"code": 5002
},
{
"name": "MIXER",
"code": 5003
},
{
"name": "SCAM",
"code": 5005
},
{
"name": "SANCTIONED",
"code": 5006
}
]
}POST /address-compliance/api/v3/risk-score HTTP/1.1
Host: aml.blocksec.com
API-KEY: text
Content-Type: application/json
Accept: */*
Content-Length: 86
{
"chain_id": -2,
"address": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"interaction_risk": true
}

{
"request_id": "2694550636314f27",
"code": 200000,
"message": "Success",
"data": {
"request_id": "f8c8b448531544fa",
"code": 200000,
"message": "Success",
"data": {
"chain_id": -2,
"address": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"risk_score": 4,
"risk_indicators": [
{
"type": "Interaction Risk",
"indicator": {
"name": "Child Abuse Material",
"code": 5002
},
"source ": "TUQbf1PgWvxKethbrYLFY842UL6Z41RiKC",
"risk_interactions": [
{
"block_number": 58020393,
"timestamp": "1704694983",
"tx_hash": "04f7d318f7f20fa70fd2c08a19416456477258c347c4ec3f12a1e673dfdc55e9",
"from": "TUQbf1PgWvxKethbrYLFY842UL6Z41RiKC",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 1854,
"usd_value": 1867.91427
},
{
"block_number": 58032108,
"timestamp": "1704730134",
"tx_hash": "7fdad2ae6f852868f816b2369527972444051d0cff8ee584992d268d951f745a",
"from": "TUQbf1PgWvxKethbrYLFY842UL6Z41RiKC",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 65,
"usd_value": 65.487825
},
{
"block_number": 58495156,
"timestamp": "1706119941",
"tx_hash": "db44cf8d89cf6b5771a1f71878081b8b54f151228ee37a737848a6c6fcb165d1",
"from": "TUQbf1PgWvxKethbrYLFY842UL6Z41RiKC",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 3125,
"usd_value": 3148.453125
},
{
"block_number": 58676396,
"timestamp": "1706663814",
"tx_hash": "2ba1845e914a1ff248041ff9f376c16523c631306407fba023b18023df965826",
"from": "TUQbf1PgWvxKethbrYLFY842UL6Z41RiKC",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 545,
"usd_value": 549.090225
},
{
"block_number": 58722612,
"timestamp": "1706802501",
"tx_hash": "35dc1451ea09fbf5aeeca1c74f60a433ad1132d58504b4eb0034fa7fa4f6c567",
"from": "TUQbf1PgWvxKethbrYLFY842UL6Z41RiKC",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 162.13,
"usd_value": 163.34678565
}
]
},
{
"type": "Interaction Risk",
"indicator": {
"name": "Child Abuse Material",
"code": 5002
},
"source ": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"risk_interactions": [
{
"block_number": 58780047,
"timestamp": "1706974857",
"tx_hash": "3d1d9dda94a34b606c5ba00b719ddb183bf8e6e219cffebb7785527e84278be9",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 197.8,
"usd_value": 199.284489
},
{
"block_number": 58852638,
"timestamp": "1707192690",
"tx_hash": "21a89f8206571d930ae28340272d0724ac043119a6ff412a96b1a88326b390e3",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 205,
"usd_value": 206.538525
},
{
"block_number": 59473083,
"timestamp": "1709054595",
"tx_hash": "ac6ff8943583b60b4532be13c60054ec3afd82df37617ffb6a70c5de1fb88b31",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 1106.1,
"usd_value": 1114.4012805
},
{
"block_number": 59499315,
"timestamp": "1709133315",
"tx_hash": "5de6810ab0087fcfbe37950af8a45a706ba493ee97d5e598cf9b2c1e2733cedb",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 1546,
"usd_value": 1557.60273
},
{
"block_number": 59810463,
"timestamp": "1710067038",
"tx_hash": "4ab9e00048f40b04c90bbe89a446855bd2ebaedb405e15176e45fadd6386f7b6",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 396.7,
"usd_value": 399.6772335
},
{
"block_number": 59981396,
"timestamp": "1710584886",
"tx_hash": "f83c771c44daa50e9f541eaaedf9fe9df52107c77f504178f342bae745966b25",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 364,
"usd_value": 366.73182
},
{
"block_number": 60032414,
"timestamp": "1710737982",
"tx_hash": "eea6aae7dbc64080b08444ae8b9bd4c725e5b7d5fb6f05672e744e801bc621a6",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 126.4,
"usd_value": 127.34863200000001
},
{
"block_number": 60147528,
"timestamp": "1711083531",
"tx_hash": "c37ff83c6d5b4c28d85bff6b87288c15d51533c70b7c19b5493de4f7d1f3213c",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 201.6,
"usd_value": 203.113008
},
{
"block_number": 60537953,
"timestamp": "1712255241",
"tx_hash": "88bd543432eceadd90c7017d792983b681ccca7c90ef24d2cf32a57bffc2bd73",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 3029.85,
"usd_value": 3052.58902425
},
{
"block_number": 60617355,
"timestamp": "1712493522",
"tx_hash": "17458cfae7f38f1eba14ff77f7ac3080e40c3e18187ac06e6a64ffe2df661a4e",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 372,
"usd_value": 374.79186
},
{
"block_number": 61138819,
"timestamp": "1714059045",
"tx_hash": "6eb1c28cfa4a89405d8ce62c345fdd532a375719830c2b4fa2bb9d6c26e9654f",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 1098,
"usd_value": 1106.24049
},
{
"block_number": 61368600,
"timestamp": "1714748580",
"tx_hash": "c9bbb77601740b1a622cab17ae26e4106048c8794c6d2d02ce5120a1ad51c70f",
"from": "TA2G85LLXqtbcMwwZUKn4gDdQ9EkoHRp8V",
"to": "TJXSFyP1CsHxN4oEjG2QGNFT3DWWuoS4C4",
"token_contract": "TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t",
"token_symbol": "USDT",
"amount": 216.7,
"usd_value": 218.32633349999998
}
]
}
]
}
}
}The Risk Score API evaluates the risk level associated with a given address. When an address is assessed as high-risk, the API also returns detailed insights explaining the key factors contributing to that risk.
Please note that this API analyzes only the target address and its one-hop related addresses. For a comprehensive crypto-compliance solution—such as a fully featured Know-Your-Address (KYA) API—refer to the BlockSec Phalcon Compliance App, which offers a free trial account.
When assessing the risk of an address, we take into account several key factors, including its type, attributes, associated entities, and on-chain interactions. The address type indicates whether it is an EOA (Externally Owned Account) or a CA (Contract Account). The concepts of attributes and entities are . On-chain interactions refer to the specific blockchain transactions and activities in which the address has participated.
Among the information involved in the assessment, certain factors influence the assessment strategy, while others serve as critical risk indicators that significantly affect the assessment results. The following are the leading risk indicators used in our methodology, which can also be obtained through requests to stay informed about any changes in risk indicators.
Based on the risk assessment algorithm mentioned earlier, we classify an address's compliance risk into five levels, represented by scores ranging from 1 to 5. A higher score indicates a higher compliance risk associated with that address.
For addresses with a score of 4 or higher, it is advisable to refrain from interacting with them. For addresses with a score of 3, it is recommended to carefully consider the accompanying indicators to determine whether it is appropriate to engage with them.
Based on how we identify risks, we categorize them into Individual and interaction risks. Individual risk primarily stems from the attributes and behavior of the address itself, while interaction risk arises from the address's involvement in risky on-chain transactions.
By default, we consider Individual and interaction risks to provide the final result. However, due to the temporary lack of support for interaction risk in some networks (refer to the section) and the longer calculation time required for interaction risk, we offer the option to specify whether to include the calculation of interaction risk when requesting compliance risk for an address.
Subscribe to to use this API in your service to help meet the compliance requirements and secure users' assets.
MetaSleuth provides a built-in saving feature that allows you to save your current investigation progress. This ensures that you can come back to it later. Also, you can simply click on "Untitled" and modify the chart's name. This makes it easier for you to manage your data and share insights with others.





GAMBLING
5016
The entity associated with this address is a gambling platform.
MIXING
5008
The address, primarily a contract, or associated service is believed to possess the capability to obfuscate fund flows.
LAUNDERING
5034
The addresses and entities associated with this label are believed to engage in money laundering activities.
CHILD ABUSE MATERIAL
5002
The entity associated with this address has been identified as forums and websites that facilitate the buying, selling, and distribution of child abuse material.
MIXER
5003
The entity associated with this address has been classified as a mixer.
DARKWEB BUSINESS
5001
This address has been involved in illicit businesses within the dark web.
DARK MARKET
5010
The entity associated with this address is a dark web marketplace.
ATTACKER
5012
This address is involved in a cyber attack.
RANSOMWARE
5009
The entity affiliated with this address is a ransomware group.
SCAM
5005
This address is engaged in fraudulent activities.
SANCTIONED
5006
The entity associated with this address has been sanctioned.
EXPLOIT
5040
The attacker or the attacker's contract or the attacker transfers funds and other addresses related to the attacker.
TERRORIST
5043
Entities that use violence or threats to intimidate populations or governments for political or ideological aims.
Ethereum Mainnet
ETH
1
True
Optimism Mainnet
OPTIMISM
10
True
Cronos Mainnet
CRONOS
25
True
BNB Smart Chain Mainnet
BSC
56
True
Gnosis
GNOSIS
100
False
Polygon Mainnet
POLYGON
137
True
BitTorrent Chain Mainnet
BITTORRENT
199
False
Fantom
FANTOM
250
True
Boba Network
BOBA
288
False
zkSync Era Mainnet
ZKSYNC ERA
324
False
CLV Parachain
CLV
1024
False
Polygon zkEvm
POLYGON ZKEVM
1101
False
WEMIX3.0 Mainnet
WEMIX
1111
False
Moonbeam
MOONBEAM
1284
True
Mantle
MANTLE
5000
True
Moonriver
MOONRIVER
1285
False
Base
BASE
8453
True
Arbitrum One
ARBITRUM
42161
True
Celo Mainnet
CELO
42220
False
Avalanche C-Chain
AVALANCHE
43114
True
Linea
LINEA
59144
True
Blast Mainnet
BLAST
81457
False
Aurora Mainnet
AURORA
1313161554
False
NO KYC
5020
The VASP (Virtual Asset Service Provider) associated with the address does not have a KYC (Know Your Customer) procedure in place.
BLOCKED
5018
The address has been blacklisted by critical contracts, primarily USDT and USDC.
SUSPICIOUS
5017
Address with suspicious activities.
COMPROMISED
5013
Solana
SOLANA
-3
True
Tron
TRX
-2
True
Bitcoin Mainnet
BTC
-1
This address is deemed at risk, either due to being an externally owned account (EOA) with a weak key or a contract that is susceptible to exploitation.
True







The Appearance Editing Toolbox provides the functionality to edit the appearance of nodes, edges, and memos. When you open a canvas, it will initially display a node shape editor by default. You can minimize it into a canvas chart and freely drag it around, allowing yourself more space for analysis.
Clicking on an address node will open the shape editor related to that node, allowing you to edit its shape, text color, and node color.
You can perform batch editing on addresses by holding down Shift/Ctrl (Command) and clicking on nodes to select multiple ones.
Additionally, you can select any edge on the canvas to edit it, adjusting the line type, width, and color.
By selecting a memo, you can edit the font size, color, formatting, and background color of its text.





Retrieve detailed label information of a specific address on a particular chain.
0x3d12e63d4313f850d23cead57ef0c29e94c9551d1OK
Internal Server Error
Retrieve detailed label information of a list of addresses on a particular chain.
["0x3d12e63d4313f850d23cead57ef0c29e94c9551d","0xbe0eb53f46cd790cd13851d5eff43d12404d33e8"]1OK
Internal Server Error
Retrieve address labels for multiple addresses across specified blockchain networks
["0xcf2f7f94dfd385c1a2a2090c971183a121f0de0b","0x32a5b2c435bf3d41a859b48ae307dfbf3b3b54e3"][1,56]Successfully returned address labels
Invalid request parameters
Internal server error
Retrieve detailed information based on the provided entity name, supporting suffix matching
TORNADO.CASHOK
Parameter error
Internal service error
As the name suggests, Advanced Analyze is an enhanced version of the Analyze feature. With Advanced Analyze, you have the ability to specify the exact direction, token, and date range for your analysis. By utilizing this feature, you can retrieve the desired interaction data exactly as you expect it to be.




OK
OK
{
"request_id": "c82817c2fec843ce",
"code": 200000,
"message": "Success",
"data": {
"chain_id": 1,
"address": "0x3d12e63d4313f850d23cead57ef0c29e94c9551d",
"main_entity": "Binance",
"main_entity_info": {
"entity": "Binance",
"categories": [
{
"name": "EXCHANGE",
"code": 3011
},
{
"name": "OTC DESK",
"code": 3021
}
],
"attributes": null,
"description": {
"website": "https://www.binance.com/",
"twitter": "https://twitter.com/binance",
"telegram": "",
"discord": ""
}
},
"comp_entities": [
"Alameda Research"
],
"attributes": [
{
"name": "DEPOSIT ADDRESS",
"code": 4007,
"comp_info": [
"BINANCE DEPOSIT ADDRESS"
]
}
],
"name_tag": "Binance: Deposit Address"
}
}{
"request_id": "faf08205f4364c8c",
"code": 200000,
"message": "Success",
"data": [
{
"chain_id": 1,
"address": "0xbe0eb53f46cd790cd13851d5eff43d12404d33e8",
"main_entity": "Binance",
"main_entity_info": {
"entity": "Binance",
"categories": [
{
"name": "EXCHANGE",
"code": 3011
},
{
"name": "OTC DESK",
"code": 3021
}
],
"attributes": null,
"description": {
"website": "https://www.binance.com/",
"twitter": "https://twitter.com/binance",
"telegram": "",
"discord": ""
}
},
"comp_entities": null,
"attributes": [
{
"name": "COLD WALLET",
"code": 4004,
"comp_info": null
}
],
"name_tag": "Binance: Cold Wallet"
},
{
"chain_id": 1,
"address": "0x3d12e63d4313f850d23cead57ef0c29e94c9551d",
"main_entity": "Binance",
"main_entity_info": {
"entity": "Binance",
"categories": [
{
"name": "EXCHANGE",
"code": 3011
},
{
"name": "OTC DESK",
"code": 3021
}
],
"attributes": null,
"description": {
"website": "https://www.binance.com/",
"twitter": "https://twitter.com/binance",
"telegram": "",
"discord": ""
}
},
"comp_entities": [
"Alameda Research"
],
"attributes": [
{
"name": "DEPOSIT ADDRESS",
"code": 4007,
"comp_info": [
"BINANCE DEPOSIT ADDRESS"
]
}
],
"name_tag": "Binance: Deposit Address"
}
]
}{
"request_id": "6fc7387140e94b42",
"code": 200000,
"message": "Success",
"data": [
{
"chain_id": 1,
"addresses": [
{
"chain_id": 1,
"address": "0xcf2f7f94dfd385c1a2a2090c971183a121f0de0b",
"main_entity": "",
"main_entity_info": null,
"comp_entities": null,
"attributes": null,
"name_tag": ""
},
{
"chain_id": 1,
"address": "0x32a5b2c435bf3d41a859b48ae307dfbf3b3b54e3",
"main_entity": "",
"main_entity_info": null,
"comp_entities": null,
"attributes": null,
"name_tag": ""
}
]
},
{
"chain_id": 56,
"addresses": [
{
"chain_id": 56,
"address": "0xcf2f7f94dfd385c1a2a2090c971183a121f0de0b",
"main_entity": "PancakeSwap",
"main_entity_info": {
"entity": "PancakeSwap",
"categories": [
{
"name": "DEX",
"code": 3008
},
{
"name": "OPTIONS",
"code": 3044
},
{
"name": "DERIVATIVES",
"code": 3028
}
],
"attributes": null,
"description": {
"website": "https://pancakeswap.finance",
"twitter": "",
"telegram": "",
"discord": ""
}
},
"comp_entities": null,
"attributes": null,
"name_tag": "PancakeSwap V2: TRL 23"
},
{
"chain_id": 56,
"address": "0x32a5b2c435bf3d41a859b48ae307dfbf3b3b54e3",
"main_entity": "PancakeSwap",
"main_entity_info": {
"entity": "PancakeSwap",
"categories": [
{
"name": "DEX",
"code": 3008
},
{
"name": "OPTIONS",
"code": 3044
},
{
"name": "DERIVATIVES",
"code": 3028
}
],
"attributes": null,
"description": {
"website": "https://pancakeswap.finance",
"twitter": "",
"telegram": "",
"discord": ""
}
},
"comp_entities": null,
"attributes": null,
"name_tag": "PancakeSwap V2: Daddymoney"
}
]
}
]
}{
"request_id": "62e8586265bf4550",
"code": 200000,
"message": "Success",
"data": {
"entity": "Tornado Cash",
"categories": [
{
"name": "MIXER",
"code": 3017
},
{
"name": "PRIVACY",
"code": 3032
}
],
"attributes": [
{
"name": "SANCTIONED",
"code": 4015,
"comp_info": [
"OFAC Sanctioned"
]
}
],
"description": {
"website": "https://tornadocash-eth.ipns.dweb.link/",
"twitter": "https://x.com/tornadocash",
"telegram": "",
"discord": ""
}
}
}GET /address-label/api/v3/chain-list HTTP/1.1
Host: aml.blocksec.com
API-KEY: YOUR_API_KEY
Accept: */*
{
"request_id": "12cf29e910584a23",
"code": 200000,
"message": "Success",
"data": [
{
"chain_id": -3,
"chain_name": "SOLANA"
},
{
"chain_id": -2,
"chain_name": "TRON"
},
{
"chain_id": -1,
"chain_name": "BITCOIN"
},
{
"chain_id": 1,
"chain_name": "ETHEREUM"
},
{
"chain_id": 10,
"chain_name": "OPTIMISM"
},
{
"chain_id": 25,
"chain_name": "CRONOS"
},
{
"chain_id": 56,
"chain_name": "BNB SMART CHAIN"
},
{
"chain_id": 100,
"chain_name": "GNOSIS"
},
{
"chain_id": 137,
"chain_name": "POLYGON"
},
{
"chain_id": 169,
"chain_name": "MANTA PACIFIC"
},
{
"chain_id": 199,
"chain_name": "BITTORRENT"
},
{
"chain_id": 250,
"chain_name": "FANTOM OPERA"
},
{
"chain_id": 288,
"chain_name": "BOBA"
},
{
"chain_id": 324,
"chain_name": "ZKSYNC"
},
{
"chain_id": 1024,
"chain_name": "CLV PARACHAIN"
},
{
"chain_id": 1101,
"chain_name": "POLYGON ZKEVM"
},
{
"chain_id": 1111,
"chain_name": "WEMIX3.0 MAINNET"
},
{
"chain_id": 1284,
"chain_name": "MOONBEAM"
},
{
"chain_id": 1285,
"chain_name": "MOONRIVER"
},
{
"chain_id": 5000,
"chain_name": "MANTLE"
},
{
"chain_id": 8453,
"chain_name": "BASE"
},
{
"chain_id": 42161,
"chain_name": "ARBITRUM ONE"
},
{
"chain_id": 42220,
"chain_name": "CELO"
},
{
"chain_id": 43114,
"chain_name": "AVALANCHE C-CHAIN"
},
{
"chain_id": 59144,
"chain_name": "LINEA"
},
{
"chain_id": 81457,
"chain_name": "BLAST"
},
{
"chain_id": 1313161554,
"chain_name": "AURORA"
}
]
}POST /address-label/api/v3/labels HTTP/1.1
Host: aml.blocksec.com
API-KEY: YOUR_API_KEY
Content-Type: application/json
Accept: */*
Content-Length: 69
{
"chain_id": 1,
"address": "0x3d12e63d4313f850d23cead57ef0c29e94c9551d"
}POST /address-label/api/v3/batch-labels HTTP/1.1
Host: aml.blocksec.com
API-KEY: YOUR_API_KEY
Content-Type: application/json
Accept: */*
Content-Length: 118
{
"chain_id": 1,
"addresses": [
"0x3d12e63d4313f850d23cead57ef0c29e94c9551d",
"0xbe0eb53f46cd790cd13851d5eff43d12404d33e8"
]
}POST /address-label/api/v3/multi-chains-labels HTTP/1.1
Host: aml.blocksec.com
API-KEY: YOUR_API_KEY
Content-Type: application/json
Accept: */*
Content-Length: 121
{
"chains": [
1,
56
],
"addresses": [
"0x3d12e63d4313f850d23cead57ef0c29e94c9551d",
"0xbe0eb53f46cd790cd13851d5eff43d12404d33e8"
]
}POST /address-label/api/v3/entity HTTP/1.1
Host: aml.blocksec.com
API-KEY: YOUR_API_KEY
Content-Type: application/json
Accept: */*
Content-Length: 25
{
"entity": "TORNADO.CASH"
}The Address Label API enables users to fetch address labels and comprehensively understand an address from various perspectives. It currently supports more than 25 different blockchains, including Solana, Bitcoin, Tron, Ethereum, BSC and other EVM-compatible chains.
When using our API to look up an address, we will return three types of labels to describe the address.
We use Entity to describe an address's owner or controller. If it's an EoA address, this means the entity that controls this EoA address (with the private key). For a smart contract, the entity can refer to their deployers (projects).
Most entities are organizations or services, while only a few represent individuals. Most entities are categorized into the following categories, which can help you understand their nature.
We use Attribute to describe the behavior or action associated with a specific address or entity. All attributes are listed in the table below.
A name is utilized to describe a cryptocurrency address with human-readable information. Assigning names usually considers the entity associated with the address and its specific attributes, such as Binance Hot Wallet 1 or Vitalik 2.
The Address Label API supports 25 different chains, which are listed in the chart below. We also provide an that allows you to retrieve a list of all supported chains, enabling you to stay informed about any newly added chains.
Subscribe to to use this API in your service to help meet the compliance requirements and secure users' assets.
DAPP
3005
A decentralized application (dApp) is an application developed on a decentralized network, integrating a smart contract and a user interface. When a dApp does not fit into specific categories such as DEFI, it is placed under this general category. However, it may be categorized under newly added categories in the future.
DARK MARKET
3006
Illicit websites on the dark web that facilitate the buying and selling of illegal goods and services, including drugs, weapons, counterfeit currency, and stolen data.
DEFI
3007
DeFi apps, which are decentralized finance applications, provide peer-to-peer financial services on public blockchains. When a DeFi dApp does not fall into specific categories like DEX (Decentralized Exchange), it is placed under this general category. However, it may be categorized under newly added categories in the future.
DEX
3008
Peer-to-peer marketplaces where transactions occur directly between crypto traders.
DEX AGGREGATOR
3009
A platform that sources liquidity from various decentralized exchanges to provide optimal trade execution in terms of price and slippage
ECOMMERCE
3010
E-commerce platforms that support cryptocurrencies.
EXCHANGE
3011
Centralized platforms that enable individuals to buy, sell, and trade various cryptocurrencies.
FAUCET
3012
An app or a website that distributes small amounts of cryptocurrencies as a reward for completing easy tasks.
GAMBLING
3013
Online platforms that allow users to gamble using cryptocurrencies.
INFRASTRUCTURE
3014
Basic services or programs deployed on the blockchain, such as the ENS (Ethereum Name Service) service and Solana system programs.
NFT MARKETPLACE
3015
Platforms that facilitate the buying, selling, and creation of Non-Fungible Tokens (NFTs).
MINING POOL
3016
A mining pool is when individual crypto miners join together and pool their resources in order to improve their chances of obtaining a block reward.
MIXER
3017
A service that blends the cryptocurrencies of many users together to obfuscate the origins and owners of the funds.
PAYMENT PROCESSOR
3018
A service that processes payments in digital currencies and allows merchants to accept cryptocurrency payments.
RANSOMWARE
3019
Criminal gangs conducting extortion through ransomware.
WALLET
3020
Softwares or hardwares that enable users to store and use cryptocurrency.
OTC DESK
3021
Service providers offering OTC intermediary platforms, e.g., Binance, Coinbase.
GOVERNMENT
3022
Government institutions.
STAKING
3023
Staking-related projects.
STABLE COIN
3024
Stablecoin-related projects, including collateralized and algorithmic stablecoins.
LENDING
3025
Lending platforms.
YIELD FARMING
3026
Yield farming projects.
YIELD AGGREGATOR
3027
Yield aggregators.
DERIVATIVES
3028
Derivative trading platforms.
SERVICES
3029
One-stop DeFi service platforms offering LaunchPad, Staking, Swap, and other services.
LAUNCHPAD
3030
ICO platforms.
INDEXES
3031
Projects similar to traditional finance index funds.
PRIVACY
3032
Protocols that hide transaction information.
SYNTHETICS
3033
Synthetic asset-related projects.
INSURANCE
3034
Insurance-related projects.
SOCIALFI
3035
On-chain social networking.
GAMING
3036
Gaming-related projects.
ORACLE
3037
Projects connecting on-chain and off-chain data.
TRADING
3038
Projects that perform trading or help users trade (trading platforms).
UTILITY TOOL
3039
Practical blockchain tools for token management, distribution, etc.
NFT
3040
NFT projects.
DAO
3041
DAO organizations.
SCAM
3042
Scam-related groups.
LIQUIDITY MANAGER
3043
Liquidity management projects.
Options
3044
Options-related projects.
RWA
3045
Real-world asset-related projects.
RESERVE CURRENCY
3046
Reserve currency-related projects.
INDIVIDUAL
3047
Individual related accounts.
CELEBRITY
3048
Celebrities, etc.
TERRORIST
3049
Entities that use violence or threats to intimidate populations or governments for political or ideological aims.
DEPOSIT ADDRESS
4007
The deposit address here refers to the address used by the centralized platform to receive user deposits, and typically, each user is assigned their own unique deposit address.
HOT WALLET
4009
A hot wallet is a type of cryptocurrency wallet that is connected to the internet and is actively used for transactions and day-to-day cryptocurrency management.
LAUNDERING
4011
The addresses and entities associated with this attribute are believed to engage in money laundering activities.
MIXING
4012
This label is attributed to services or addresses (primarily contracts) that are believed to possess the capability to obfuscate fund flows.
NO KYC
4013
The VASP (Virtual Asset Service Provider) associated with the address does not have a KYC (Know Your Customer) procedure in place.
RETURN FUNDS
4014
Address utilized for executing an attack or exploit, followed by the subsequent return of funds. This individual could be a white hat hacker or someone who reached a settlement with the project team.
SANCTIONED
4015
The cryptocurrency address associated with individuals or organizations subject to sanctions.
SCAM
4016
The addresses associated with individuals or organizations involved in fraudulent activities, including phishing, honeypots, Ponzi schemes, and more.
SUSPICIOUS
4017
Addresses showing unusual patterns that may indicate illegal activities or money laundering attempts.However, it is not currently possible to determine what type of illegal activity this is.
EXPLOIT
4018
Address involved in one or more attacks.
WHITE HAT
4019
The 'White Hat' attribute designates an address associated with individuals or entities known for ethical practices in cybersecurity, typically engaging in activities that aid in identifying and resolving security vulnerabilities lawfully and constructively.
Optimism Mainnet
OPTIMISM
10
Cronos Mainnet
CRONOS
25
BNB Smart Chain Mainnet
BSC
56
Gnosis
GNOSIS
100
Polygon Mainnet
POLYGON
137
BitTorrent Chain Mainnet
BITTORRENT
199
Fantom
FANTOM
250
Boba Network
BOBA
288
zkSync Era Mainnet
ZKSYNC ERA
324
CLV Parachain
CLV
1024
Polygon zkEvm
POLYGON ZKEVM
1101
WEMIX3.0 Mainnet
WEMIX
1111
Moonbeam
MOONBEAM
1284
Moonriver
MOONRIVER
1285
Base
BASE
8453
Arbitrum One
ARBITRUM
42161
Celo Mainnet
CELO
42220
Avalanche C-Chain
AVALANCHE
43114
Linea
LINEA
59144
Blast Mainnet
BLAST
81457
Aurora Mainnet
AURORA
1313161554
ASSET MANAGEMENT
3001
Financial institutions that specialize in managing and investing assets on behalf of clients.
BRIDGE
3002
Protocols that facilitate the movement of assets and data between different blockchain networks.
CHILD ABUSE MATERIAL
3003
Forums and websites that facilitate the buying, selling, and distribution of child abuse material.
CLOUD MINING
3004
Services that allow individuals to rent processing power from remote data centers to mine cryptocurrency without managing physical hardware.
ATTACKER
4001
Addresses involved in attack events, such as contract exploits, private key hacks, or extortions.
BLOCKED
4002
Addresses that have been blocked by critical contracts, primarily USDT and USDC.
COLD WALLET
4004
A cold wallet refers to a type of cryptocurrency wallet that is stored offline and is not connected to the internet.
DARKWEB BUSINESS
4006
Addresses involved in dark web businesses, encompassing activities such as drugs, weapons, abuse, and other illicit practices.
Solana
SOLANA
-3
Tron
TRX
-2
Bitcoin Mainnet
BTC
-1
Ethereum Mainnet
ETH
1