Returns the risk score for a specific blockchain address based on advanced network proximity analysis, machine learning, and behavioral pattern recognition—representing the industry’s most comprehensive approach to blockchain threat detection.
| Name | Type | Required | Description |
|---|---|---|---|
| address | string | ✅ | The blockchain address to assess. |
| network | string | ✅ | Canonical network identifier. The value must match the address format. |
solana - Solanacelestia - Celestiaosmosis-1 - Osmosisdydx-mainnet-1 - dYdXcosmoshub-4 - Cosmos Hubneutron-1 - Neutronunion-testnet-9 - Union Testnetdymension_1100-1 - Dymensionagoric-3 - Agoricmantra-1 - MANTRAstride-1 - Stridepio-mainnet-1 - Provenancemantra-dukong-1 - MANTRA Dukongnoble-1 - Noblezig-test-1 - Zig Testunion-1 - Unionstellar - StellarNote: The network identifier must exactly match the format of the address being assessed. For optimal results, use one of the fully supported networks listed above.
riskScore (number, 1–10) – A numerical value where higher scores indicate greater risk. The score reflects whether the address itself is malicious, or how close and well-connected it is to one or more malicious addresses.
riskLevel (string) – A human‑readable description of the risk, aligned to the riskScore.
numHops (integer ≥ 0) – The minimum number of token‑transfer steps connecting the input address to any known malicious address. A value of 0 means the address itself is malicious; 1 means it has directly transacted with a malicious address; 2 means there’s one intermediary address between it and a malicious address; and so on. Higher values indicate greater separation from threats and typically result in lower risk scores.
maliciousAddressesFound (array) – Evidence used in scoring. List of the malicious addresses that the address to assess is connected to. Each object contains:
address (string) – A malicious or ML-flagged address encountered on the path.distance (integer ≥ 0) – Number of hops from the input address to this malicious address.name_tag (string | null) – A human‑readable label describing activity.entity (string | null) – Known organization or cluster controlling the malicious address.category (string) – Type of malicious activity.name_tag, entity, or category are blank or null, this indicates one of two scenarios: (1) the data comes from confidential intelligence sources where specific attribution details cannot be disclosed, or (2) the address was identified through our machine learning models and lacks traditional attribution data. In both cases, we can confirm the address presents potential risk, but detailed attribution may be limited.
reasoning (string) – Plain‑English explanation of why the score was assigned. This may include information about direct malicious activity, proximity to malicious addresses, or other insights.
attribution (object | null) – Attribution metadata for known non-malicious addresses (e.g., system programs, well-known protocols). When present, indicates the address is a verified non-malicious entity, which may override proximity-based risk scoring. Contains:
name_tag (string) – Human-readable name (e.g., “Token Program”)entity (string) – Organization or protocol (e.g., “Solana”)category (string) – Classification type (e.g., “SYSTEM”)address_role (string) – Functional role (e.g., “Program”)numHops) to any malicious address. Fewer hops imply higher risk.| riskScore | riskLevel | Typical situation |
|---|---|---|
| 10 | CRITICAL RISK (directly malicious) | Address itself is flagged (0 hops) |
| 9–8 | Extremely high risk | 1 hop from malicious; ≥ 3 hits ⇒ 9, otherwise 8 |
| 7–6 | High risk | 2 hops; ≥ 3 hits ⇒ 7, otherwise 6 |
| 5–4 | Medium risk | 3 hops; ≥ 3 hits ⇒ 5, otherwise 4 |
| 3–2 | Low risk | 4 hops; ≥ 3 hits ⇒ 3, otherwise 2 |
| 1 | Very low risk | ≥ 5 hops OR known attributed non-malicious address |
name_tag, category, entity, address_role, malicious status) from multiple sources including internal research, community reports, government sanctions lists, partnerships with security companies, and other public/private sources.
Attribution Override: Known non-malicious addresses (system programs like Token Program, verified protocols, major exchanges) are identified in our attribution database. When an address is confirmed as a non-malicious entity, the risk score is automatically overridden to the minimum value (1, “Very low risk”), regardless of graph proximity to malicious addresses. This prevents false positives where legitimate system infrastructure appears risky due to high transaction volumes with diverse counterparties. The attribution field in the response provides transparency about this override.
| HTTP Code | Cause | Example Body | Recommended Action |
|---|---|---|---|
| 400 | Missing or invalid address/network | { "error": "BadRequest", "message": "address is required" } | Validate parameters before requesting. |
| 404 | Address/network not found or unsupported | { "error": "NotFound", "message": "network unsupported" } | Use a supported network value; ensure address correctness. |
| 429 | Rate limited | { "error": "RateLimitExceeded" } | Reduce request rate; follow Retry-After header for backoff. |
| 5xx | Server error | { "error": "ServerError" } | Retry after a delay; contact support if persistent. |
network value consistent with the address format.numHops as the minimum transfer distance; greater distances generally reduce risk.riskScore and riskLevel in your UI, and display reasoning as explanatory text.distance.attribution field: when present, it indicates a verified non-malicious address with risk override applied.Authorization method required to allow user to access the api endpoints.
Address to search
Network ID of the address. Supports multiple networks including solana, osmosis-1, dydx-mainnet-1, cosmoshub-4, neutron-1, stellar, and others.
"solana"
Transactions associated with a specific address. This includes both incoming and outgoing transactions.
Calculated normalized risk score (higher = riskier)
8
Human readable risk level classification
CRITICAL RISK (Directly malicious), Extremely high risk, High risk, Medium risk, Low risk, Very low risk Minimum number of hops to the closest malicious address
List of malicious or related addresses discovered in the path
Explanation of why the risk level/score was assigned
Attribution information for known non-malicious addresses