You’ll need an API key. All requests require a Bearer token. If you don’t have one yet, get your API key →
Authentication
Every Risk API request uses the same authentication pattern. Pass your API key in theAuthorization header:
https://api.range.org
1. Screen an Address
The Address Risk Score endpoint is the most commonly used starting point. It returns a risk score (1-10) for any blockchain address across 27 supported networks.Example Response
Example Response
Key Response Fields
| Field | What It Tells You |
|---|---|
riskScore | Numerical risk (1-10). Higher = more dangerous. |
riskLevel | Human-readable label for the score. |
numHops | Shortest path distance to a known malicious address. 0 means the address itself is malicious. |
maliciousAddressesFound | The evidence - which malicious addresses were found and how far away they are. |
reasoning | Plain-English explanation of why the score was assigned. Display this to users. |
attribution | If present, this is a verified non-malicious entity (exchange, system program, protocol). The score is overridden to 1. |
What the Scores Mean
| Score | Meaning | Typical Action |
|---|---|---|
| 10 | Directly malicious (0 hops) | Block |
| 8-9 | 1 hop from malicious | Block or flag |
| 6-7 | 2 hops from malicious | Flag for review |
| 4-5 | 3 hops from malicious | Monitor |
| 1-3 | Low risk or verified entity | Allow |
2. Check Sanctions & Blacklists
The Sanctions & Blacklist Check endpoint screens an address against OFAC sanctions and stablecoin issuer blacklists (Tether, Circle, Coinbase, Paxos).Example Response (Minimal)
Example Response (Minimal)
Key Response Fields
| Field | What It Tells You |
|---|---|
is_token_blacklisted | true if currently blacklisted by any stablecoin issuer. |
is_ofac_sanctioned | true if the address appears on the OFAC SDN list. |
token_status_summary | Per-token breakdown (which issuers, when blacklisted). Only with include_details=true. |
blacklist_event_history | Full chronological event log. Only with include_details=true. |
ofac_info | Sanction details including name, entity, and official OFAC URL. |
Two Modes
| Mode | Use Case |
|---|---|
include_details=true (default) | Compliance workflows where you need full event history and attribution data |
include_details=false | High-volume screening where you only need a pass/fail result |
The Address Risk Score endpoint already includes sanctions and blacklist data in its scoring. Use this standalone endpoint when you need explicit sanctions documentation for audit trails, or the detailed event history.
3. Assess Payment Risk
The Payment Risk Assessment endpoint is the most comprehensive check. It analyzes both sender and recipient across 8 independent risk dimensions - including everything Address Risk Score does, plus payment-specific checks.Example Response
Example Response
Key Response Fields
| Field | What It Tells You |
|---|---|
overall_risk_level | Final verdict: "low", "medium", "high", or "unknown". Uses maximum-risk approach - if any factor is high, the overall level is high. |
risk_factors | Array of individual assessments. Each has a factor name, risk_level, and description. |
errors | Non-empty if some checks couldn’t be performed (e.g., unsupported network for some checks). |
Risk Dimensions Checked
| Check | What It Detects |
|---|---|
| New wallet detection | Recipient has no transaction history |
| Dormant wallet detection | Recipient inactive for 180+ days |
| Address poisoning | Recipient matches a lookalike scam address |
| Interaction history | Sender and recipient have never transacted before |
| Malicious connections | Sender or recipient is close to known malicious addresses |
| Attributed address check | Sender or recipient is a known sanctioned or blacklisted entity |
| Token risk | Sender/recipient tokens have risk factors (Solana, requires sender_token/recipient_token) |
| Cross-chain analysis | Appropriate checks for same-network vs cross-chain payments |
4. Evaluate a Token
The Token Risk Assessment endpoint evaluates up to 17 risk factors for Solana tokens. Try it with USDC:Example Response (Abbreviated)
Example Response (Abbreviated)
Key Response Fields
| Field | What It Tells You |
|---|---|
overall_assessment.risk_level | "LOW", "MEDIUM", or "HIGH" based on the aggregate score. |
overall_assessment.risk_percentage | Percentage of maximum possible risk. LOW <30%, MEDIUM 30-60%, HIGH ≥60%. |
summary | How many factors were assessed and how many triggered at each level. |
risk_factors | Individual assessments with level and explanation for each factor. |
errors | Which factors were skipped due to missing data. Fewer assessed factors = less reliable result. |
Common Errors
| HTTP Code | Meaning | What to Do |
|---|---|---|
| 400 | Invalid parameters (missing address, bad format) | Check your query parameters. |
| 401 | Invalid or missing API key | Verify your Authorization: Bearer header. |
| 404 | Address or network not found | Check the network identifier against Supported Chains. |
| 422 | Validation error (e.g., invalid mint address format) | Check input format requirements in the endpoint docs. |
| 429 | Rate limit exceeded | Implement exponential backoff. See Rate Limits. |
| 5xx | Server error | Retry after a delay. Contact support if persistent. |
What’s Next
Test Addresses
More test addresses across all endpoints and networks for verifying your integration.
Understanding Risk Scores
Deep dive into how scores are calculated and how to interpret them.
Compliance Pipeline
Build a multi-layered screening workflow combining multiple endpoints.
Wallet Integration
Add real-time risk protection to wallets and dApps.

