Allpass.ai
HomeWeb SiteTerms of ServicesPrivacy Policy
  • Introduction
  • Get Started
    • Sign Up and Sign In
    • Navigation
    • Test and Live Modes
    • Company Settings
    • Application
    • Work With the Team
      • User Roles and Permissions
      • Send Invites and Assign Roles
    • Notifications Settings
  • Build Verification Flows
    • Flow Builder Overview
    • Verification Steps
      • Intro
      • Document Check
      • Liveness
      • Facematching
      • Selfie With a Document
      • Email Verification
      • Phone verification
      • AML
      • Crypto Transaction and Wallet Check
      • Questionnaire
      • Final Screen
    • UI Customization
    • Duplicate Workflows
    • Workflow Drafts
    • Questionnaire Builder
  • Verify Your Users
    • Run Verification Flows
    • Receiving and Completing Verification
    • Restart the Verification Flow
    • Change the Verification Flow
    • Request Additional Information
    • Manual Compliance Check
    • Manual Crypto Transaction and Wallet Monitoring
  • Review Data
    • Verification Status
    • Review Process
    • Applicant Profile
      • Document Check
      • Liveness
      • Facematch
      • Selfie with the document
      • Email Verification
      • Phone Verification
      • AML check
      • Crypto Transaction and Wallet Check
      • Questionnaire
      • IP and Geo Data
    • Applicant Timeline
    • Deactivating and Activating Verification Results
    • Applicant Profile Deletion
  • Download Reports
  • Analytics Dashboard
  • Integration
    • Overview
    • Get Started
    • How to use
    • Installation
    • Initialize
    • Render
    • Webhooks
      • Applicant Webhooks
      • Webhook Timestamp Validation Requirement
    • Open API
    • Dictionary
      • Enums
      • Entities
      • Term & Abbreviations
      • Supported Countries & Documents
    • Encryption
  • TROUBLESHOOTING
    • IP Address Detected as VPN
    • Incomplete User Verification Flows
Powered by GitBook

© 2024 Allpass.ai by elKYC OU. All rights reserved

On this page
Export as PDF
  1. Review Data
  2. Applicant Profile

Crypto Transaction and Wallet Check

The Crypto Transaction and Wallet Monitoring block provides comprehensive insights into blockchain activity, risk assessments, and compliance outcomes.

PreviousAML checkNextQuestionnaire

Last updated 4 months ago

How to Use Crypto Wallet and Transaction Check Block

  1. Accessing the Applicant’s Page

    • Navigate to the Applicant's page to find the Transaction Monitoring block.

    • This block displays wallet addresses or transaction IDs linked to the applicant, along with their corresponding risk scores and monitoring statuses:

  1. Accessing Wallet and Transaction Details

  • Click on the wallet or transaction ID in the Transaction Monitoring block to view detailed insights.

  • This will open a comprehensive view of blockchain activity, including transaction history, risk factors, and flagged compliance issues:

  1. Interpreting Report Details The transaction monitoring report provides comprehensive insights into the sources and uses of funds associated with a monitored crypto wallet. Here's how to interpret key sections of the report:

  • Risk scores displayed next to the wallet or transaction ID help gauge the likelihood of suspicious activity:

    • Low Scores: 0-30

    • Medium Scores: 31-69

    • High Scores: 70 - 100

High Scores suggest potentially suspicious behavior that requires further review

  • The Risk Exposure section provides an overview of the risk profile associated with the monitored wallet and its transactions. It breaks down risks into specific categories to help you quickly identify areas of concern related to fund sources, fund usage, and overall transaction behavior:

  • Source of Funds section analyzes the origins of the funds received by the monitored wallet. It identifies the risk levels and potential issues linked to where the funds came from. The source of funds allows users to identify potentially risky inflows, such as funds from high-risk or hacked wallets. Clicking on an entity (e.g., Root Tx or Leaf Tx) will open the corresponding details on a separate page for further analysis.

  • Use of Funds provides an analysis of how funds leaving the wallet are being used, helping to determine if the transactions align with legitimate activity. It helps to determine if the wallet's activity includes potentially suspicious transfers, such as sending funds to unknown or high-risk entities. Similar to the source section, users can click on the listed entities to access additional details on a separate page.

  • Every Entity listed in the report is clickable. Clicking on a name redirects you to a dedicated Entity Details page, where you can view a deeper analysis, and associated blockchain data:

  1. Taking Actions

  • Use the Deactivate button to move resolved or unnecessary cases to history and stop monitoring.

  • Toggle the Monitoring option ON or OFF to enable or disable ongoing observation of a specific wallet or transaction:

You can also take specific actions from the detailed view page:

  • Add to Monitoring Use the Add to Monitoring button to include the wallet address in active monitoring. This ensures that any future transactions or changes related to the wallet are tracked for compliance and risk management purposes

  • Exporting Data Use the Download button in the top-right corner to generate a report of transaction details and compliance findings for recordkeeping or regulatory submission.

  • Refresh Data Click Refresh to update the displayed information with the latest blockchain activity and risk analysis. This ensures you are working with the most up-to-date data.

  • Viewing Timeline The Timeline button on the Applicant’s page provides a chronological record of all verification steps and actions taken.