Prerequisites: You need a Risk API key and familiarity with the Address Risk Score, Sanctions & Blacklist Check, and Payment Risk Assessment endpoints.
Choosing the Right Approach
Range’s risk endpoints are layered - each higher-level endpoint includes the checks of the ones below it:| Endpoint | What It Includes | Best For |
|---|---|---|
| Sanctions & Blacklist Check | OFAC sanctions, stablecoin issuer blacklists | Fast pass/fail sanctions screening |
| Address Risk Score | Everything in Sanctions + proximity analysis + ML-based threat detection | Screening a single address |
| Payment Risk Assessment | Everything in Address Risk + new wallet detection, dormant wallet detection, address poisoning, interaction history, token risk, cross-chain analysis | Assessing a payment between two addresses |
Architecture Overview
A compliance pipeline typically uses one of two patterns:Pattern A: Payment Flow (Recommended for Transactions)
When you have both sender and recipient, use Payment Risk Assessment as the primary check. It includes address risk scoring and sanctions/attribution data for both addresses, plus payment-specific analysis.Pattern B: Address Screening (No Payment Context)
When screening a single address (e.g., during onboarding, before allowing deposits), use Address Risk Score - which already includes sanctions and blacklist data.When to Use the Standalone Sanctions Endpoint
The Sanctions & Blacklist Check endpoint is still useful when you need:- Explicit OFAC compliance documentation - a dedicated sanctions check provides a clear audit record specifically for sanctions screening
- High-volume, low-latency pre-filtering - the sanctions endpoint is the fastest and cheapest check, useful as a first gate before more expensive analysis
- Detailed blacklist event data - with
include_details=true, it returns specific blacklist/unblacklist events from stablecoin issuers that aren’t available through the other endpoints
Screening a Payment
When you have sender, recipient, and amount, the Payment Risk Assessment is the single endpoint you need. It analyzes both addresses across 8 risk dimensions - including malicious connection analysis and attributed address checks (which cover sanctions and blacklist data).Decision Matrix
| Payment Risk Level | Risk Factors | Action |
|---|---|---|
| Any | malicious_address_sender or malicious_address_recipient flagged HIGH | REJECT - Address flagged as malicious |
| High | Multiple HIGH factors | REJECT - High risk on multiple signals |
| High | Single HIGH factor (e.g., first_interaction) | FLAG - Manual review required |
| Medium | - | FLAG - Elevated risk, needs review |
| Low | - | ALLOW - Low risk |
| Unknown | - | FLAG - Insufficient data, treat with caution |
These thresholds are recommendations. Calibrate them based on your risk appetite, regulatory requirements, and use case. See the calibration guidance below.
Screening a Single Address
When you don’t have payment context (e.g., during onboarding or deposit screening), use Address Risk Score. It includes sanctions and blacklist data along with proximity analysis and ML-based threat detection.Decision Thresholds
| Score | Risk Level | Action |
|---|---|---|
| 8–10 | Critical / Extremely high | REJECT - Directly or closely connected to malicious activity |
| 6–7 | High | FLAG or REJECT - Depends on risk tolerance |
| 4–5 | Medium | FLAG - Manual review recommended |
| 1–3 | Low / Very low | ALLOW |
Adding a Dedicated Sanctions Check
For compliance teams that need an explicit, documented sanctions screening step - separate from the broader risk analysis - add a standalone Sanctions & Blacklist Check as a fast pre-filter:- Creating a separate audit record specifically for sanctions compliance
- Fast pre-filtering before more expensive checks
- Getting detailed blacklist event history with
include_details=true
Log and Audit
For compliance, store the raw API responses alongside your decision. This creates an audit trail showing what data was available at the time of the decision.- Timestamp of each check
- Raw API responses (scores, risk levels, reasoning, individual risk factors)
- Decision and the logic that produced it
- Operator overrides if a flagged transaction was manually approved or rejected
Threshold Calibration
Different use cases warrant different risk tolerances. These thresholds apply to Address Risk Score (riskScore 1–10):
| Use Case | Reject At | Flag At | Rationale |
|---|---|---|---|
| Consumer wallet | Score ≥ 8 | Score ≥ 6 | Protect retail users, fewer false positives |
| Exchange compliance | Score ≥ 6 | Score ≥ 3 | Regulatory obligation, tighter screening |
| Institutional treasury | Score ≥ 4 | Score ≥ 2 | Maximum caution for large value flows |
| DeFi protocol | Score ≥ 8 | Score ≥ 6 | Balance usability with risk mitigation |
Full Pipeline Examples
Payment Flow
Address Screening with Optional Sanctions Audit
What’s Next
Understanding Risk Scores
Deep dive into how risk scores are calculated and how to interpret them.
Faraday API
For end-to-end compliant payment execution with built-in Risk API screening.

