Skip to main content
Range’s Risk API provides real-time risk intelligence for blockchain activity. Screen addresses for proximity to malicious actors, assess token legitimacy, evaluate payment safety, and check sanctions compliance - all through a unified API.
Authentication required. All Risk API requests require a Bearer token in the Authorization header. Get your API key →
Base URL: https://api.range.org

Which Endpoint Should I Use?

I want to…EndpointNetworks
Check if an address is connected to known malicious actorsAddress Risk ScoreSolana, EVM chains, Stellar, Bitcoin, Tron, Cosmos ecosystem — 27 networks
Assess the risk profile of a Solana tokenToken Risk AssessmentSolana
Evaluate end-to-end payment safety between two addressesPayment Risk AssessmentSolana, Stellar, Cosmos ecosystem — see all
Check OFAC sanctions and stablecoin issuer blacklistsSanctions & Blacklist CheckAll (OFAC), Ethereum/Tron/Solana (blacklists)
Simulate a Solana transaction before broadcastingTransaction SimulatorSolana

Quick Start

New to the Risk API? The Quick Start guide walks you through your first calls to each endpoint with example requests and response interpretation.

Risk API Quick Start

Make your first API calls and learn how to interpret the responses.

Risk Endpoints

Coming Soon


How Risk Scoring Works

Range combines multiple data sources and analytical techniques to produce risk scores. For a deep dive into methodology and how to interpret scores, see Understanding Risk Scores.
Analyzes the shortest path distance between addresses and known malicious entities across the transaction graph. Malicious actors exhibit clustering behavior and maintain greater distances from regulated exchanges.
Proprietary ML models trained on verified malicious addresses extract behavioral signatures to identify previously undetected threats, expanding coverage beyond traditional threat intelligence.
Integrates data from sanctions lists (OFAC, EU, UK, UN), confirmed exploits, scams, phishing attacks, and other verified malicious activity sources.
Examines transaction patterns, timing behaviors, counterparty relationships, and other on-chain activity to identify suspicious patterns.

Guides

Step-by-step guides for common integration patterns:
Last modified on March 2, 2026