Skip to main content

Risk Endpoints

Evaluate blockchain addresses, transactions, and smart contracts for potential threats using Range’s advanced risk assessment capabilities.

Risk Assessment Methodology

Range’s risk scoring combines multiple data sources and analytical techniques:
Analyzes the shortest path distance between addresses and known malicious entities across the transaction graph. Research shows that malicious actors exhibit clustering behavior and maintain greater distances from regulated exchanges.
Proprietary ML models trained on verified malicious addresses extract behavioral signatures to identify previously undetected threats, expanding coverage beyond traditional threat intelligence.
Integrates data from sanctions lists (OFAC, EU, UK, UN), confirmed exploits, scams, phishing attacks, and other verified malicious activity sources.
Examines transaction patterns, timing behaviors, counterparty relationships, and other on-chain activity to identify suspicious patterns.

Use Cases

Transaction Screening

Screen counterparties before high-value transfers to prevent sending funds to malicious addresses.

Compliance Monitoring

Automated AML/KYC compliance with real-time sanctions screening and risk scoring.

Fraud Prevention

Detect address poisoning, phishing attempts, and other fraud schemes before they impact users.

Security Analysis

Investigate smart contract security, token legitimacy, and counterparty risk for protocols and treasuries.