Skip to main content
Range’s risk scoring engine combines multiple data sources and analytical techniques to produce actionable risk intelligence. This guide explains the methodology behind our risk assessments and how to interpret scores across different endpoints.

Scoring Scales

Different endpoints use different scoring scales depending on the type of assessment:
EndpointScaleLevels
Address Risk Score1–10 (numeric)Very low risk (1) → CRITICAL RISK (10)
Token Risk Assessment0–100% (percentage)LOW (<30%), MEDIUM (30–60%), HIGH (≥60%)
Payment Risk AssessmentCategoricallow, medium, high, unknown
Sanctions & BlacklistBooleanis_token_blacklisted, is_ofac_sanctioned

Core Methodology

Network Proximity Analysis

Our risk assessment leverages peer-reviewed research establishing that legitimate and malicious blockchain activity exhibit distinguishable network patterns. The approach is grounded in three empirically-validated behavioral characteristics:
  1. Clustering behavior - Malicious actors demonstrate clustering through coordinated operations, shared infrastructure, or interconnected money laundering chains
  2. Transactional proximity - Direct transactional relationships with malicious addresses correlate with elevated risk profiles
  3. Exchange distance - Legitimate users maintain significantly shorter network distances to regulated cryptocurrency exchanges
Empirical analysis of the Ethereum blockchain substantiates these patterns: 56% of high-value USDC wallets maintain direct links to regulated exchanges, while 83% of confirmed exploiter addresses operate at greater distances from these entities (Liao et al., 2025).

Machine Learning Enhancement

Our ML algorithms enhance traditional address matching by learning behavioral patterns from known malicious addresses:
  1. Behavioral Fingerprinting - Analyzing transaction history to generate 100+ address-level features that capture payment patterns, timing behaviors, and counterparty interactions
  2. Pattern Recognition - Training classifiers to recognize behavioral patterns that distinguish malicious actors from legitimate users
  3. Ensemble Classification - Combining multiple ML models to improve accuracy in identifying potentially malicious addresses
Addresses flagged by ML models are treated the same as those from traditional attribution sources.

Threat Intelligence

Our attribution dataset provides off-chain information from multiple sources including internal research, community reports, government sanctions lists, partnerships with security companies, and other public/private sources. This includes:
  • Confirmed malicious addresses from threat intelligence feeds
  • OFAC, EU, UK, and UN sanctions lists
  • Confirmed exploits, scams, and phishing attacks
  • Verified non-malicious addresses (system programs, protocols, exchanges)

Attribution Override

Known non-malicious addresses (system programs like Token Program, verified protocols, major exchanges) receive the minimum risk score regardless of proximity to malicious addresses. This prevents false positives where legitimate infrastructure appears risky due to high transaction volumes. The attribution field in API responses provides transparency about this override.

Address Risk Scoring (1–10 Scale)

The Address Risk Score endpoint computes risk using:
  1. Attribution override - Known non-malicious addresses receive score 1 regardless of proximity
  2. Direct maliciousness - Flagged addresses receive score 10
  3. Hop distance - Shortest path to any malicious address (fewer hops = higher risk)
  4. Hit count - Total malicious addresses found on shortest and near-shortest paths
ScoreRisk LevelTypical Situation
10CRITICAL RISK (directly malicious)Address itself is flagged (0 hops)
9–8Extremely high risk1 hop from malicious; ≥3 hits → 9, otherwise 8
7–6High risk2 hops; ≥3 hits → 7, otherwise 6
5–4Medium risk3 hops; ≥3 hits → 5, otherwise 4
3–2Low risk4 hops; ≥3 hits → 3, otherwise 2
1Very low risk≥5 hops OR known attributed non-malicious address
Search depth: Risk analysis examines paths up to 5 hops from the input address. Addresses with no connections to malicious entities within this range receive score 1.

Token Risk Scoring (Percentage Scale)

The Token Risk Assessment evaluates up to 17 independent risk factors across 5 categories. Each factor scores:
  • LOW = 0 points
  • MEDIUM = 1 point
  • HIGH = 2 points
The risk percentage is: (total_score / max_possible_score) × 100
ClassificationThreshold
HIGH RISK≥60% of maximum possible score
MEDIUM RISK≥30% but <60%
LOW RISK<30%
Not all 17 factors may be assessed for every token due to data availability. The API adjusts the maximum possible score based on how many factors were successfully evaluated, ensuring fair assessment even with partial data.

Token Risk Factor Summary

FactorCategoryHIGHMEDIUMLOW
Circulating Supply RatioAuthority & Control<80%80–95%>95%
Freeze AuthorityAuthority & ControlPresent-Absent/Disabled
Mint AuthorityAuthority & ControlPresent-Absent/Disabled
Market CapitalizationMarket Structure<$1M1M1M–100M>$100M
Token VerificationMarket StructureUnverified-Verified
LiquidityMarket Structure<$10K10K10K–100K>$100K
Holder CountMarket Structure<100100–1000>1000
Top Holder ConcentrationMarket Structure>90%80–90%<80%
Price VolatilityTrading Patterns>50%20–50%<20%
Wash TradingTrading PatternsSuspicious ≥2 TF-Normal
Organic ActivityTrading PatternsLowMediumHigh
Developer MigrationsPlatform & Social≥52–4<2
Exchange ListingsPlatform & SocialNo listings<3/no majorMajor exchanges
Launchpad PlatformPlatform & SocialHigh-risk (pump.fun)-Other platforms
Social Media PresencePlatform & SocialNo presence-Active presence
Token AgeTemporal<7 days7–30 days>30 days
Graduation StatusTemporal-<7 days>7 days/N/A
See Token Risk Assessment for detailed explanations of each factor.

Payment Risk Scoring (Maximum Risk Approach)

The Payment Risk Assessment runs up to 8 independent assessments. The overall risk level uses a maximum risk approach: if any individual factor returns “high”, the overall risk is “high”.
AssessmentWhat It Checks
New Wallet DetectionRecipient transaction history
Dormant Wallet DetectionRecipient inactivity (>180 days)
Address Poisoning DetectionPoison address pattern matching
Interaction HistoryPrevious sender-recipient relationship
Malicious Connection AnalysisML-powered proximity to malicious addresses
Attributed Address CheckKnown entity database lookup
Token Risk (Solana)Token-specific risk factors
Cross-Chain SupportAppropriate index selection for cross-chain payments

Best Practices for Acting on Risk Scores

  • Don’t rely on a single endpoint. For high-value transactions, combine Address Risk Score with Payment Risk Assessment and Sanctions Check for comprehensive coverage.
  • Calibrate thresholds to your use case. A consumer wallet may block at score 6; an exchange compliance system may flag at score 3 for manual review.
  • Check the reasoning field. Risk scores are more useful when combined with the human-readable explanation of why the score was assigned.
  • Handle “unknown” gracefully. Payment Risk returns "unknown" for unsupported networks. This doesn’t mean safe - it means insufficient data.
  • Cache cautiously. Risk scores can change as new threat intelligence is incorporated. For compliance-critical flows, query in real-time.
  • Display context to end users. Show riskLevel and reasoning (not just the numeric score) for transparency.
Last modified on March 2, 2026