A practical, compliance-first guide to screening crypto wallets and transactions:
how blockchain AML tools calculate risk scores, what the FATF Travel Rule requires,
how to choose between Chainalysis, Elliptic, TRM Labs, and Crystal Blockchain,
and how to handle flagged addresses — whether you're an exchange, a DeFi protocol,
or an individual user trying to understand a compliance rejection.
Quick rule: A "clean" risk score is a snapshot of a wallet's on-chain history,
not a character reference. Scores change as new transaction history accumulates.
Understand what your tool is measuring before acting on its output.
Crypto Compliance Screening: How the Workflow Works (Identify → Screen → Score → Act)
①
Identify the address or transaction to screen
Gather the on-chain identifier — a wallet address, a transaction hash, or an entity name.
Know which blockchain you're screening (ETH, BTC, Solana, etc.) since tools track
different networks with different coverage depth.
②
Run the blockchain analytics query
Submit the address to your chosen analytics provider. The tool traces the transaction
graph — mapping fund flows backward to known entities (exchanges, mixers, darknet markets,
sanction lists) and forward to counterparties.
③
Interpret the risk score in context
Risk scores are probability-weighted signals, not verdicts. A medium score on a DeFi
protocol interaction means something very different from a medium score on direct
mixer exposure. Context — cluster type, exposure distance, volume — changes the picture.
④
Document, decide, and act
Record the screening result, your interpretation, and your decision. Compliance value
comes from the audit trail, not just the score. If blocking, communicate the basis
clearly. If allowing, document why the risk is acceptable.
Overview: What Crypto AML Screening Is and Who Needs It
Anti-money laundering screening in crypto means using blockchain analytics tools to assess
whether a wallet address or transaction has a history linked to illicit activity —
darknet markets, ransomware, sanctioned entities, mixers, or fraud.
The goal is not to surveil all users; it is to identify whether specific funds have been
proximate to known criminal activity, and to what degree.
Regulated entities — centralised exchanges, custodians, payment processors, and
increasingly DeFi protocols in regulated jurisdictions — face legal obligations
under AML/CFT frameworks. The FATF's updated guidance
(fatf-gafi.org)
treats virtual asset service providers (VASPs) as obligated entities equivalent
to traditional financial institutions.
ExchangesCustodiansPayment processors
Who benefits from voluntary screening
Individual users receiving large transfers, DeFi protocols managing treasury funds,
and DAOs accepting contributions can use blockchain analytics proactively to avoid
unknowingly accepting tainted funds — which could create downstream compliance
problems or asset freezes.
DeFi protocolsDAOsIndividual users
Operational truth: Screening is not about passing judgment on users.
It is about understanding the provenance of funds to meet legal obligations and protect
your platform from processing criminal proceeds. A clear, documented screening policy
protects both compliance staff and users.
How Blockchain Analytics Work: Tracing Funds On-Chain
Blockchain analytics firms build entity databases by clustering addresses they believe
are controlled by the same entity — exchanges, mixers, darknet markets, ransomware wallets —
and then trace transaction flows through the graph to calculate how "close" any given address
is to those known entities. The methodology is explained in
Chainalysis's public research blog
and
Elliptic's blog.
Heuristic clustering
The most widely used clustering method is "common input ownership" — the assumption
that if multiple addresses are used as inputs in the same transaction, they are
likely controlled by the same entity. Analytics firms combine this with proprietary
intelligence, exchange deposit patterns, and public information to assign addresses
to named clusters.
Common input heuristicExchange depositsProprietary intelligence
Direct vs indirect exposure
Direct exposure means your address has transacted directly with a
known illicit entity. Indirect exposure means a counterparty of yours
has done so. Most tools distinguish these and weight them differently — a single hop
from a mixer is treated as far more concerning than a third-degree connection through
a legitimate exchange.
Limitation to understand: Clustering heuristics are probabilistic, not
certain. False positives occur — especially for CoinJoin transactions, exchange hot wallets
shared across users, and multi-signature setups. Always treat a risk score as input to
a decision, not the decision itself.
Risk Scores Explained: What Low, Medium, and High Actually Mean
Risk scores are vendor-specific and not standardised across tools. A "55/100" on one
platform is not comparable to a "55/100" on another. What matters is what the underlying
exposure categories are — and what your risk tolerance is for each category.
Low (0–25)
Clear
Medium (26–74)
Review
High (75–100)
Flag
Score range
Typical exposure
Recommended action
0–25 Low
Clean history; exposure only to regulated entities (exchanges, wallets)
Proceed normally; document the result
26–60 Medium
Indirect exposure to risky categories; peer-to-peer platforms; unhosted wallets
Enhanced due diligence; request source-of-funds documentation
61–100 High
Direct or near-direct exposure to mixers, darknet markets, ransomware, OFAC-sanctioned entities
Block or freeze pending investigation; file SAR/STR if required by jurisdiction
Calibration matters: Many compliance teams set different thresholds per
risk category. Exposure to a sanctioned entity (OFAC SDN list) should trigger immediate
action regardless of score — it is a legal obligation, not a policy choice.
Exposure to a peer-to-peer exchange at medium score may only require enhanced documentation.
FATF Travel Rule and the Regulatory Context (2026)
The Financial Action Task Force (FATF) is the global standard-setter for anti-money
laundering. Its 2019 update to Recommendation 16 extended the "Travel Rule" —
previously applied to bank wire transfers — to virtual asset service providers (VASPs).
The full guidance is at
fatf-gafi.org.
What the Travel Rule requires
VASPs transferring virtual assets above a threshold (USD/EUR 1,000 in most jurisdictions)
must collect, verify, and transmit originator and beneficiary information to the
receiving VASP — mirroring what banks do with SWIFT messages. This requires both
parties to have compatible identity data infrastructure. Failure to comply creates
regulatory exposure for the transmitting VASP.
$1,000 thresholdOriginator dataBeneficiary data
Travel Rule implementation in 2026
Implementation is uneven globally. The EU's Transfer of Funds Regulation (TFR)
removes the minimum threshold — all transactions require Travel Rule data.
Solutions like
TRM Labs
and the IVMS101 messaging standard have emerged to handle cross-VASP data exchange.
Unhosted wallet transactions add complexity — most regulators require enhanced due
diligence above the threshold.
EU: no thresholdIVMS101 standardUnhosted wallet EDD
US context: FinCEN's rules under the Bank Secrecy Act require MSBs
(money services businesses) handling virtual assets to file SARs for suspicious activity
and comply with the Travel Rule above USD 3,000. See
FinCEN's virtual currency guidance
for the current position.
How to Screen a Wallet Address: A Clean, Repeatable Workflow
Confirm the network: know whether you're screening a Bitcoin address, an Ethereum address, a Tron address, etc. Most tools require you to specify the blockchain. Submitting an ETH address to a Bitcoin-only query returns nothing useful.
Select the right tool for your use case: enterprise compliance teams typically use Chainalysis KYT or Elliptic Navigator. Individual checks or smaller operations may use TRM Labs, Crystal Blockchain, or simpler tools like AMLBot. Match the tool to your volume and integration needs.
Run the screening query: submit the address and retrieve the risk report. Most tools return a risk score, a breakdown by exposure category, and the top entities in the address's transaction history.
Interpret the output in context: read the category breakdown, not just the headline score. A high score driven entirely by a single indirect connection to a peer-to-peer exchange is different from a high score driven by direct mixer interaction.
Apply your risk policy: compare the output to your documented risk thresholds. If the score exceeds your "manual review" threshold, initiate enhanced due diligence. If it exceeds your "block" threshold, act accordingly and document.
Record everything: save the screening report with timestamp, address, score, category breakdown, your risk assessment, and the action taken. This audit trail is what regulators will examine.
Re-screen on material changes: a wallet's score can change as it accumulates new transaction history. For ongoing relationships, periodic re-screening is good practice — especially for high-volume counterparties.
Best practice: Build screening into your onboarding and withdrawal workflows
as an automated API call — not a manual step. Manual processes get skipped under operational
pressure. Automation ensures every transaction is screened and every decision is logged.
AML Tool Comparison: Chainalysis, Elliptic, TRM Labs, Crystal Blockchain
The major blockchain analytics platforms cover overlapping but not identical datasets.
Choose based on coverage breadth, integration options, and price point for your volume.
Tool
Strengths
Best for
Integration
Chainalysis KYT
Broadest entity database; law enforcement relationships; deep BTC/ETH coverage
European VASPs; BTC-heavy operations; compliance reporting
REST API; dashboard
No tool is complete: All major providers acknowledge that their coverage
is probabilistic and dataset-dependent. Running addresses through two different tools
and comparing outputs is a reasonable practice for high-stakes decisions.
TRM Labs publishes methodology notes at
trmlabs.com/blog;
Crystal's methodology is at
crystalblockchain.com/resources.
Red Flags: Exposure Types That Trigger Higher Risk Scores
Not all "risky" exposure categories carry equal weight. Understanding what each category
means helps distinguish true compliance risk from algorithmic noise.
Sanctioned entities (OFAC SDN list): highest severity. Even indirect exposure at one or two hops requires immediate review. OFAC sanctions are US legal obligations regardless of where your business is incorporated in many cases. OFAC's list is at ofac.treasury.gov.
Mixers / tumblers / CoinJoin: high risk. Funds sent through mixing services have deliberately obscured their provenance — a textbook AML red flag. However, note that CoinJoin use is not inherently criminal; some privacy-focused users employ it legitimately. Volume and pattern matter.
Darknet market wallets: high risk. Direct or near-direct interaction with known darknet market deposit addresses is among the strongest indicators of illicit activity.
Ransomware wallets: high risk. Payments to known ransomware operator wallets are tracked by Chainalysis and others; some jurisdictions prohibit paying ransomware demands entirely.
Unregulated exchanges / P2P platforms: medium risk. High-volume flow through unregulated P2P platforms suggests AML-avoidant behavior but is not automatically illicit.
Gambling: medium risk. Jurisdiction-dependent — gambling is legal in many places. Volume and frequency of interaction affect how tools score this.
High-risk jurisdictions: geography-based flags for transactions involving entities in FATF "grey list" or "black list" countries, or US/EU sanctioned states.
Heuristic: Build tiered responses. Sanctions exposure → automatic block.
Mixer exposure above a volume threshold → block. Indirect P2P exposure below a value
threshold → document and allow with enhanced monitoring. One-size-fits-all is not
a compliance program — it's theatre.
Review: What Makes a Reliable AML Screening Service (2025–2026)
Evaluating blockchain analytics vendors is different from evaluating standard software.
Coverage accuracy, update latency, and methodology transparency matter far more than UI design.
Signals of a quality provider
Published methodology documentation. Regular public reports on illicit activity patterns
(Chainalysis's annual Crypto Crime Report; Elliptic's Typologies reports). Law enforcement
track record — tools used in actual prosecutions tend to have better-quality data.
Transparent false positive rate acknowledgment. Clear data retention and privacy policy.
Warning signs to evaluate
No published methodology — risk scores with no explanation of how they're calculated
cannot be defended in a compliance audit or legal dispute. Overconfident certainty —
"this address is criminal" rather than "this address has X% exposure to Y category."
Poor chain coverage for your users' assets. No audit log or evidence trail for
your compliance records.
2025 / 2026 regulatory lens: Regulators in the EU (MiCA/TFR), UK (FCA),
and US (FinCEN) are increasing scrutiny of the quality of VASPs' AML programs — not just
whether they "have a tool," but whether they act appropriately on its output.
Tool selection is now an auditable compliance decision, not just a technical one.
What to Do When a Wallet Is Flagged
Being flagged does not automatically mean criminal activity. It means a tool has found
transaction history it considers risky based on its dataset and methodology.
The appropriate response depends entirely on who is flagging whom and what the exposure actually is.
If your own wallet gets flagged by an exchange
Request the specific reason: you are entitled to know what category of exposure triggered the flag. Most regulated exchanges will provide this on request, or as part of their frozen-funds notification.
Gather source-of-funds documentation: if you received funds from a legitimate source (employer payroll, an OTC desk, another exchange withdrawal), collect that evidence — bank statements, exchange withdrawal records, payroll documentation.
Run the address yourself: use a public tool like Crystal's free tier or a lower-cost provider to understand what the tool is seeing. Compare the output to the exchange's explanation.
Dispute through official channels: if the flag appears to be a false positive (incorrect clustering, outdated dataset), submit a formal dispute with supporting evidence to the exchange's compliance team. Analytics providers also have processes for flagging incorrect entity attributions.
If you're operating a platform and need to freeze funds
Document the screening result and your risk policy before taking any action.
Notify the affected user in a jurisdiction-appropriate way.
File any required Suspicious Activity Reports (SARs) in your jurisdiction before releasing or blocking funds.
Do not "tip off" a user if you have filed or are filing a SAR — this is prohibited in most jurisdictions.
Hard rule: Never take adverse action against a user based solely on a risk
score without reviewing the underlying exposure breakdown. Automated blocks on low-quality
signals create false positives that damage users and expose your platform to wrongful
account closure claims.
Comparison: Manual Screening vs Automated vs API Integration
The right screening approach depends on your transaction volume, team size, and
regulatory obligations.
Decision rule: If your platform processes more than a few hundred
transactions per day, manual screening is not a compliance program — it's a liability.
API integration is the minimum standard for any regulated VASP at scale.
Best Practices for Crypto Compliance Teams
Write a risk-based AML policy before choosing a tool. Your risk appetite drives tool configuration — not the other way around. Know your user base, jurisdiction exposure, and acceptable risk levels before asking vendors to set thresholds.
Screen on deposit and withdrawal, not just onboarding. A wallet clean at onboarding can interact with a mixer six months later. Real-time or periodic re-screening catches this; onboarding-only screening does not.
Train your compliance team to interpret scores, not just read them. A team that understands clustering heuristics, hop distance, and category weighting will make far better decisions than one that mechanically acts on headline scores.
Document every decision with the underlying rationale. Regulators and courts care about the decision-making process. "The tool said high, so we blocked" is not a compliant program. "The tool showed direct mixer exposure above X%, consistent with our policy threshold, so we blocked under policy section Y" is.
Build a dispute resolution process before you need it. False positives will happen. Have a documented process for users to submit source-of-funds evidence and for your team to re-review flagged cases.
Stay current with FATF and local guidance. The regulatory environment is changing rapidly. Subscribe to FATF guidance updates at fatf-gafi.org and your local financial regulator's virtual asset issuances.
Most common compliance mistake: Building an AML program around a single tool
score with a single threshold. Effective compliance programs use risk scores as one input
among several — combined with KYC data, behavioral analytics, and manual analyst review
for edge cases. Risk scores are a starting point, not a conclusion.
Troubleshooting: Common Screening Issues and Disputes
"My address scores high but I've never used a mixer"
You may have received funds from a counterparty who did use a mixer — indirect exposure at 1–2 hops can still score medium or high depending on the tool's methodology and the volume involved.
Run the address on two different tools and compare the category breakdown. If both flag the same category at similar exposure levels, the issue is likely real indirect exposure. If the outputs diverge significantly, the flagging may reflect a tool-specific clustering error.
If you received funds from a centralised exchange, contact that exchange's compliance team — they may be able to provide a certificate of withdrawal confirming the funds' origin within their custodial system.
"The tool's score changed significantly without any new transactions"
Analytics providers update their entity databases continuously. A wallet that was previously attributed to an unknown cluster may now be attributed to a newly-identified darknet market or mixer — without any change to the on-chain transaction history.
This is expected behavior. Document the previous score and the new score, along with the date of change, in your records. Investigate whether the updated attribution appears credible based on the transaction history.
"My compliance team disagrees on how to handle a medium-score address"
This signals a gap in your risk policy documentation, not a tool problem. Medium-score addresses are where policy must be explicit: which categories at which exposure levels trigger enhanced due diligence vs blocking vs allow-with-monitoring. Write the policy decisions down before the next disputed case.
Best debugging approach: Treat the transaction graph as your primary
evidence, not the score. Most analytics tools allow you to drill into the actual
transaction path that generated the score. Understanding the specific entities and
distances involved turns a number into an actionable assessment.
AML Check: Authoritative Notes & External References
About: Prepared by Crypto Finance Experts as a practical SEO-oriented knowledge base covering
crypto AML screening: how blockchain analytics tools work, risk score interpretation,
FATF Travel Rule compliance, tool comparison, screening workflows, and troubleshooting.
AML Check: Frequently Asked Questions
A crypto AML check is the process of submitting a blockchain address or transaction to an analytics tool that traces its fund-flow history and calculates a risk score based on proximity to known illicit entities — mixers, darknet markets, ransomware operators, and sanctioned addresses. The tool maps the transaction graph from your address to known clusters and weights each connection by distance and volume. The output is a risk score and a breakdown by exposure category, which you interpret against your risk policy to decide whether to proceed, investigate, or block.
Risk scores are vendor-specific indicators of exposure to illicit activity — not verdicts of guilt. A high score means the address has transaction history in proximity to known bad actors. Low scores mean clean, regulated entity exposure. Medium scores require judgment: read the category breakdown to understand what is driving the score. A medium score from indirect P2P exposure is treated very differently from a medium score from direct mixer interaction. Scores are inputs to decisions, not decisions themselves.
The FATF Travel Rule requires Virtual Asset Service Providers (VASPs) to collect and transmit originator and beneficiary identity information when transferring virtual assets above a threshold (typically USD/EUR 1,000, or no threshold under EU rules). This mirrors the wire transfer rules applied to traditional banks. VASPs sending funds must verify the beneficiary VASP is compliant and pass the identity data securely. The practical challenge is that crypto transfers lack the messaging infrastructure banks use — specialized Travel Rule solutions (Sygna, Notabene, etc.) have emerged to fill this gap.
Each has different strengths. Chainalysis has the broadest entity database and strongest law enforcement track record — best for large exchanges and institutions where forensic quality matters. Elliptic has strong DeFi and cross-chain coverage — better for protocols operating across multiple chains. TRM Labs offers wide chain support and competitive pricing — good for mid-market VASPs. Crystal Blockchain is strong for Bitcoin-focused operations and European compliance reporting. Most enterprise compliance teams evaluate two providers before committing. Run the same test addresses through multiple tools and compare outputs.
First, request the specific reason for the freeze in writing. Regulated exchanges must provide the basis for adverse action. Second, gather source-of-funds documentation — where did the flagged funds come from? Bank statements, exchange withdrawal records, and payroll documentation are all relevant. Third, run the address yourself using an analytics tool to understand what exposure is being flagged. Fourth, submit a formal dispute through the exchange's compliance channel with your supporting evidence. If the freeze appears to be a data error (incorrect entity clustering), you can also contact the analytics provider directly — most have processes for flagging incorrect attributions.
The type of wallet software (hardware vs software vs custodial) does not affect your AML risk score. Scores are based entirely on on-chain transaction history — what entities your address has transacted with, at what distance, and in what volume. A hardware wallet address with direct exposure to a darknet market deposit wallet will score just as high as a software wallet with the same history. Wallet type affects key security and custody, not AML risk profile.
This is one of the most contested regulatory questions in crypto. Currently, most truly decentralised protocols without a centralised operator are not considered VASPs under FATF guidance and therefore do not have explicit AML obligations. However, frontend interfaces, deployer teams, and governance token holders may face obligations depending on jurisdiction. The EU's MiCA regulation and FATF's 2021 guidance are pushing toward broader coverage. Many DeFi protocols screen wallet connections at the frontend level voluntarily — to protect their team members and reduce regulatory risk — even without explicit legal obligations.
Direct exposure means your address has transacted in a single hop with a known illicit entity — you sent funds to or received funds from a mixer, ransomware wallet, or darknet market deposit address. Indirect exposure means a counterparty of yours has done so — you transacted with an address that then sent to a mixer. Most analytics tools weight direct exposure much more heavily than indirect exposure, and exposure at 2+ hops is weighted less than at 1 hop. The practical question for compliance decisions is: how many hops away, how much volume, and what category of entity?
For individual deposits and withdrawals: screen in real time at every transaction. For existing user wallets in your book: periodic batch re-screening is standard practice — monthly or quarterly for lower-risk users, more frequently for high-value accounts. A wallet that scored clean at onboarding can acquire new illicit exposure as its subsequent transaction history develops. Analytics providers update their entity databases continuously — a wallet clean against last month's dataset may score differently against this month's updated attribution data. Build periodic re-screening into your compliance calendar and document when it runs.