Authentication required. All Risk API requests require a Bearer token in the
Authorization header. Get your API key →https://api.range.org
Which Endpoint Should I Use?
| I want to… | Endpoint | Networks |
|---|---|---|
| Check if an address is connected to known malicious actors | Address Risk Score | Solana, EVM chains, Stellar, Bitcoin, Tron, Cosmos ecosystem — 27 networks |
| Assess the risk profile of a Solana token | Token Risk Assessment | Solana |
| Evaluate end-to-end payment safety between two addresses | Payment Risk Assessment | Solana, Stellar, Cosmos ecosystem — see all |
| Check OFAC sanctions and stablecoin issuer blacklists | Sanctions & Blacklist Check | All (OFAC), Ethereum/Tron/Solana (blacklists) |
| Simulate a Solana transaction before broadcasting | Transaction Simulator | Solana |
Quick Start
New to the Risk API? The Quick Start guide walks you through your first calls to each endpoint with example requests and response interpretation.Risk API Quick Start
Make your first API calls and learn how to interpret the responses.
Risk Endpoints
Address Risk Score
Risk scores for blockchain addresses using network proximity analysis and ML-based threat detection.
Token Risk Assessment
Multi-factor risk analysis for Solana tokens across 17 independent risk factors.
Payment Risk Assessment
End-to-end risk evaluation for payment transactions and fund transfers.
Sanctions & Blacklist Check
OFAC sanctions screening and stablecoin issuer blacklist checks.
Coming Soon
Transaction Risk Score
Risk scoring for individual blockchain transactions.
Smart Contract Risk
Security vulnerability assessment for Solana smart contracts.
How Risk Scoring Works
Range combines multiple data sources and analytical techniques to produce risk scores. For a deep dive into methodology and how to interpret scores, see Understanding Risk Scores.Network Proximity Analysis
Network Proximity Analysis
Analyzes the shortest path distance between addresses and known malicious entities across the transaction graph. Malicious actors exhibit clustering behavior and maintain greater distances from regulated exchanges.
Machine Learning Models
Machine Learning Models
Proprietary ML models trained on verified malicious addresses extract behavioral signatures to identify previously undetected threats, expanding coverage beyond traditional threat intelligence.
Threat Intelligence
Threat Intelligence
Integrates data from sanctions lists (OFAC, EU, UK, UN), confirmed exploits, scams, phishing attacks, and other verified malicious activity sources.
Behavioral Analysis
Behavioral Analysis
Examines transaction patterns, timing behaviors, counterparty relationships, and other on-chain activity to identify suspicious patterns.
Guides
Step-by-step guides for common integration patterns:Compliance Screening Pipeline
Build an automated AML/KYC workflow combining address, sanctions, and payment risk checks.
Wallet & dApp Integration
Add real-time risk protection to Solana wallets and dApps.
Token Due Diligence
Evaluate token safety before listing, trading, or integrating.
Transaction Simulation
Validate transactions before broadcasting with pre-flight simulation.
Onchain Risk Verifier
Verify wallet risk directly inside Solana programs using Switchboard oracles.
Payment Scam Prevention
Detect address poisoning, new wallet fraud, and social engineering scams.
Privacy Protocol Screening
Screen wallets before deposits to keep tainted funds out of your protocol.

