On this page (AML Check):

Overview: What Crypto AML Screening Is and Who Needs It

Anti-money laundering screening in crypto means using blockchain analytics tools to assess whether a wallet address or transaction has a history linked to illicit activity — darknet markets, ransomware, sanctioned entities, mixers, or fraud. The goal is not to surveil all users; it is to identify whether specific funds have been proximate to known criminal activity, and to what degree.

Blockchain Analytics Risk Scoring FATF Travel Rule Sanctions Screening Mixer Detection

Who is required to screen

Regulated entities — centralised exchanges, custodians, payment processors, and increasingly DeFi protocols in regulated jurisdictions — face legal obligations under AML/CFT frameworks. The FATF's updated guidance (fatf-gafi.org) treats virtual asset service providers (VASPs) as obligated entities equivalent to traditional financial institutions.

ExchangesCustodiansPayment processors

Who benefits from voluntary screening

Individual users receiving large transfers, DeFi protocols managing treasury funds, and DAOs accepting contributions can use blockchain analytics proactively to avoid unknowingly accepting tainted funds — which could create downstream compliance problems or asset freezes.

DeFi protocolsDAOsIndividual users
Operational truth: Screening is not about passing judgment on users. It is about understanding the provenance of funds to meet legal obligations and protect your platform from processing criminal proceeds. A clear, documented screening policy protects both compliance staff and users.

How Blockchain Analytics Work: Tracing Funds On-Chain

Blockchain analytics firms build entity databases by clustering addresses they believe are controlled by the same entity — exchanges, mixers, darknet markets, ransomware wallets — and then trace transaction flows through the graph to calculate how "close" any given address is to those known entities. The methodology is explained in Chainalysis's public research blog and Elliptic's blog.

Heuristic clustering

The most widely used clustering method is "common input ownership" — the assumption that if multiple addresses are used as inputs in the same transaction, they are likely controlled by the same entity. Analytics firms combine this with proprietary intelligence, exchange deposit patterns, and public information to assign addresses to named clusters.

Common input heuristicExchange depositsProprietary intelligence

Direct vs indirect exposure

Direct exposure means your address has transacted directly with a known illicit entity. Indirect exposure means a counterparty of yours has done so. Most tools distinguish these and weight them differently — a single hop from a mixer is treated as far more concerning than a third-degree connection through a legitimate exchange.

Direct: 1 hopIndirect: 2+ hopsHop distance matters
Limitation to understand: Clustering heuristics are probabilistic, not certain. False positives occur — especially for CoinJoin transactions, exchange hot wallets shared across users, and multi-signature setups. Always treat a risk score as input to a decision, not the decision itself.

Risk Scores Explained: What Low, Medium, and High Actually Mean

Risk scores are vendor-specific and not standardised across tools. A "55/100" on one platform is not comparable to a "55/100" on another. What matters is what the underlying exposure categories are — and what your risk tolerance is for each category.

Low (0–25)
Clear
Medium (26–74)
Review
High (75–100)
Flag
Score range Typical exposure Recommended action
0–25 Low Clean history; exposure only to regulated entities (exchanges, wallets) Proceed normally; document the result
26–60 Medium Indirect exposure to risky categories; peer-to-peer platforms; unhosted wallets Enhanced due diligence; request source-of-funds documentation
61–100 High Direct or near-direct exposure to mixers, darknet markets, ransomware, OFAC-sanctioned entities Block or freeze pending investigation; file SAR/STR if required by jurisdiction
Calibration matters: Many compliance teams set different thresholds per risk category. Exposure to a sanctioned entity (OFAC SDN list) should trigger immediate action regardless of score — it is a legal obligation, not a policy choice. Exposure to a peer-to-peer exchange at medium score may only require enhanced documentation.

FATF Travel Rule and the Regulatory Context (2026)

The Financial Action Task Force (FATF) is the global standard-setter for anti-money laundering. Its 2019 update to Recommendation 16 extended the "Travel Rule" — previously applied to bank wire transfers — to virtual asset service providers (VASPs). The full guidance is at fatf-gafi.org.

What the Travel Rule requires

VASPs transferring virtual assets above a threshold (USD/EUR 1,000 in most jurisdictions) must collect, verify, and transmit originator and beneficiary information to the receiving VASP — mirroring what banks do with SWIFT messages. This requires both parties to have compatible identity data infrastructure. Failure to comply creates regulatory exposure for the transmitting VASP.

$1,000 thresholdOriginator dataBeneficiary data

Travel Rule implementation in 2026

Implementation is uneven globally. The EU's Transfer of Funds Regulation (TFR) removes the minimum threshold — all transactions require Travel Rule data. Solutions like TRM Labs and the IVMS101 messaging standard have emerged to handle cross-VASP data exchange. Unhosted wallet transactions add complexity — most regulators require enhanced due diligence above the threshold.

EU: no thresholdIVMS101 standardUnhosted wallet EDD
US context: FinCEN's rules under the Bank Secrecy Act require MSBs (money services businesses) handling virtual assets to file SARs for suspicious activity and comply with the Travel Rule above USD 3,000. See FinCEN's virtual currency guidance for the current position.

How to Screen a Wallet Address: A Clean, Repeatable Workflow

  1. Confirm the network: know whether you're screening a Bitcoin address, an Ethereum address, a Tron address, etc. Most tools require you to specify the blockchain. Submitting an ETH address to a Bitcoin-only query returns nothing useful.
  2. Select the right tool for your use case: enterprise compliance teams typically use Chainalysis KYT or Elliptic Navigator. Individual checks or smaller operations may use TRM Labs, Crystal Blockchain, or simpler tools like AMLBot. Match the tool to your volume and integration needs.
  3. Run the screening query: submit the address and retrieve the risk report. Most tools return a risk score, a breakdown by exposure category, and the top entities in the address's transaction history.
  4. Interpret the output in context: read the category breakdown, not just the headline score. A high score driven entirely by a single indirect connection to a peer-to-peer exchange is different from a high score driven by direct mixer interaction.
  5. Apply your risk policy: compare the output to your documented risk thresholds. If the score exceeds your "manual review" threshold, initiate enhanced due diligence. If it exceeds your "block" threshold, act accordingly and document.
  6. Record everything: save the screening report with timestamp, address, score, category breakdown, your risk assessment, and the action taken. This audit trail is what regulators will examine.
  7. Re-screen on material changes: a wallet's score can change as it accumulates new transaction history. For ongoing relationships, periodic re-screening is good practice — especially for high-volume counterparties.
Best practice: Build screening into your onboarding and withdrawal workflows as an automated API call — not a manual step. Manual processes get skipped under operational pressure. Automation ensures every transaction is screened and every decision is logged.

AML Tool Comparison: Chainalysis, Elliptic, TRM Labs, Crystal Blockchain

The major blockchain analytics platforms cover overlapping but not identical datasets. Choose based on coverage breadth, integration options, and price point for your volume.

Tool Strengths Best for Integration
Chainalysis KYT Broadest entity database; law enforcement relationships; deep BTC/ETH coverage Enterprise exchanges; financial institutions; regulators REST API; case management UI
Elliptic Navigator Strong DeFi and cross-chain coverage; holistic risk scoring DeFi protocols; cross-chain operations; fintechs REST API; web interface
TRM Labs Wide chain support (20+); fast; competitive pricing; good Travel Rule tooling Mid-market exchanges; neobanks; emerging market VASPs REST API; webhooks
Crystal Blockchain Strong BTC tracing; compliance reporting; EU-focused European VASPs; BTC-heavy operations; compliance reporting REST API; dashboard
No tool is complete: All major providers acknowledge that their coverage is probabilistic and dataset-dependent. Running addresses through two different tools and comparing outputs is a reasonable practice for high-stakes decisions. TRM Labs publishes methodology notes at trmlabs.com/blog; Crystal's methodology is at crystalblockchain.com/resources.

Red Flags: Exposure Types That Trigger Higher Risk Scores

Not all "risky" exposure categories carry equal weight. Understanding what each category means helps distinguish true compliance risk from algorithmic noise.

Heuristic: Build tiered responses. Sanctions exposure → automatic block. Mixer exposure above a volume threshold → block. Indirect P2P exposure below a value threshold → document and allow with enhanced monitoring. One-size-fits-all is not a compliance program — it's theatre.

Review: What Makes a Reliable AML Screening Service (2025–2026)

Evaluating blockchain analytics vendors is different from evaluating standard software. Coverage accuracy, update latency, and methodology transparency matter far more than UI design.

Signals of a quality provider

Published methodology documentation. Regular public reports on illicit activity patterns (Chainalysis's annual Crypto Crime Report; Elliptic's Typologies reports). Law enforcement track record — tools used in actual prosecutions tend to have better-quality data. Transparent false positive rate acknowledgment. Clear data retention and privacy policy.

Warning signs to evaluate

No published methodology — risk scores with no explanation of how they're calculated cannot be defended in a compliance audit or legal dispute. Overconfident certainty — "this address is criminal" rather than "this address has X% exposure to Y category." Poor chain coverage for your users' assets. No audit log or evidence trail for your compliance records.

2025 / 2026 regulatory lens: Regulators in the EU (MiCA/TFR), UK (FCA), and US (FinCEN) are increasing scrutiny of the quality of VASPs' AML programs — not just whether they "have a tool," but whether they act appropriately on its output. Tool selection is now an auditable compliance decision, not just a technical one.

What to Do When a Wallet Is Flagged

Being flagged does not automatically mean criminal activity. It means a tool has found transaction history it considers risky based on its dataset and methodology. The appropriate response depends entirely on who is flagging whom and what the exposure actually is.

If your own wallet gets flagged by an exchange

If you're operating a platform and need to freeze funds

Hard rule: Never take adverse action against a user based solely on a risk score without reviewing the underlying exposure breakdown. Automated blocks on low-quality signals create false positives that damage users and expose your platform to wrongful account closure claims.

Comparison: Manual Screening vs Automated vs API Integration

The right screening approach depends on your transaction volume, team size, and regulatory obligations.

Method Best for Strengths Limitations
Manual (dashboard) Low-volume operations; individual checks; investigations No integration required; easy audit trail; analyst context available Does not scale; process gaps under pressure; no systematic coverage
Batch screening Periodic review of existing user wallets; periodic portfolio checks Covers existing book; identifies newly-flagged addresses Lagging — not real-time; requires scheduling and automation
Real-time API Exchanges; payment processors; anything with high transaction volume Every transaction screened; automated decisions; audit log built-in Integration cost; requires risk policy codification; latency considerations
Decision rule: If your platform processes more than a few hundred transactions per day, manual screening is not a compliance program — it's a liability. API integration is the minimum standard for any regulated VASP at scale.

Best Practices for Crypto Compliance Teams

Most common compliance mistake: Building an AML program around a single tool score with a single threshold. Effective compliance programs use risk scores as one input among several — combined with KYC data, behavioral analytics, and manual analyst review for edge cases. Risk scores are a starting point, not a conclusion.

Troubleshooting: Common Screening Issues and Disputes

"My address scores high but I've never used a mixer"

"The tool's score changed significantly without any new transactions"

"My compliance team disagrees on how to handle a medium-score address"

Best debugging approach: Treat the transaction graph as your primary evidence, not the score. Most analytics tools allow you to drill into the actual transaction path that generated the score. Understanding the specific entities and distances involved turns a number into an actionable assessment.

AML Check: Authoritative Notes & External References

Regulatory standards and guidance

Blockchain analytics and methodology

About: Prepared by Crypto Finance Experts as a practical SEO-oriented knowledge base covering crypto AML screening: how blockchain analytics tools work, risk score interpretation, FATF Travel Rule compliance, tool comparison, screening workflows, and troubleshooting.

AML Check: Frequently Asked Questions

A crypto AML check is the process of submitting a blockchain address or transaction to an analytics tool that traces its fund-flow history and calculates a risk score based on proximity to known illicit entities — mixers, darknet markets, ransomware operators, and sanctioned addresses. The tool maps the transaction graph from your address to known clusters and weights each connection by distance and volume. The output is a risk score and a breakdown by exposure category, which you interpret against your risk policy to decide whether to proceed, investigate, or block.

Risk scores are vendor-specific indicators of exposure to illicit activity — not verdicts of guilt. A high score means the address has transaction history in proximity to known bad actors. Low scores mean clean, regulated entity exposure. Medium scores require judgment: read the category breakdown to understand what is driving the score. A medium score from indirect P2P exposure is treated very differently from a medium score from direct mixer interaction. Scores are inputs to decisions, not decisions themselves.

The FATF Travel Rule requires Virtual Asset Service Providers (VASPs) to collect and transmit originator and beneficiary identity information when transferring virtual assets above a threshold (typically USD/EUR 1,000, or no threshold under EU rules). This mirrors the wire transfer rules applied to traditional banks. VASPs sending funds must verify the beneficiary VASP is compliant and pass the identity data securely. The practical challenge is that crypto transfers lack the messaging infrastructure banks use — specialized Travel Rule solutions (Sygna, Notabene, etc.) have emerged to fill this gap.

Each has different strengths. Chainalysis has the broadest entity database and strongest law enforcement track record — best for large exchanges and institutions where forensic quality matters. Elliptic has strong DeFi and cross-chain coverage — better for protocols operating across multiple chains. TRM Labs offers wide chain support and competitive pricing — good for mid-market VASPs. Crystal Blockchain is strong for Bitcoin-focused operations and European compliance reporting. Most enterprise compliance teams evaluate two providers before committing. Run the same test addresses through multiple tools and compare outputs.

First, request the specific reason for the freeze in writing. Regulated exchanges must provide the basis for adverse action. Second, gather source-of-funds documentation — where did the flagged funds come from? Bank statements, exchange withdrawal records, and payroll documentation are all relevant. Third, run the address yourself using an analytics tool to understand what exposure is being flagged. Fourth, submit a formal dispute through the exchange's compliance channel with your supporting evidence. If the freeze appears to be a data error (incorrect entity clustering), you can also contact the analytics provider directly — most have processes for flagging incorrect attributions.

The type of wallet software (hardware vs software vs custodial) does not affect your AML risk score. Scores are based entirely on on-chain transaction history — what entities your address has transacted with, at what distance, and in what volume. A hardware wallet address with direct exposure to a darknet market deposit wallet will score just as high as a software wallet with the same history. Wallet type affects key security and custody, not AML risk profile.

This is one of the most contested regulatory questions in crypto. Currently, most truly decentralised protocols without a centralised operator are not considered VASPs under FATF guidance and therefore do not have explicit AML obligations. However, frontend interfaces, deployer teams, and governance token holders may face obligations depending on jurisdiction. The EU's MiCA regulation and FATF's 2021 guidance are pushing toward broader coverage. Many DeFi protocols screen wallet connections at the frontend level voluntarily — to protect their team members and reduce regulatory risk — even without explicit legal obligations.

Direct exposure means your address has transacted in a single hop with a known illicit entity — you sent funds to or received funds from a mixer, ransomware wallet, or darknet market deposit address. Indirect exposure means a counterparty of yours has done so — you transacted with an address that then sent to a mixer. Most analytics tools weight direct exposure much more heavily than indirect exposure, and exposure at 2+ hops is weighted less than at 1 hop. The practical question for compliance decisions is: how many hops away, how much volume, and what category of entity?

For individual deposits and withdrawals: screen in real time at every transaction. For existing user wallets in your book: periodic batch re-screening is standard practice — monthly or quarterly for lower-risk users, more frequently for high-value accounts. A wallet that scored clean at onboarding can acquire new illicit exposure as its subsequent transaction history develops. Analytics providers update their entity databases continuously — a wallet clean against last month's dataset may score differently against this month's updated attribution data. Build periodic re-screening into your compliance calendar and document when it runs.