Why Wallet Screening Matters
Compliance
Stay ahead of OFAC and AML requirements—sanctions lists update daily
Risk Management
Stop bad actors at the door, not after they’ve moved funds
User Protection
Catch address poisoning before your users lose millions
- One integration, 12 chains — ETH, SOL, BTC, and 9 more. No vendor sprawl.
- Sub-500ms responses — Screen in real-time without blocking transactions
- Sanctions + fraud in one call — Compliance and security, unified
- Address poisoning detection — The threat most providers miss
Prerequisites
Before implementing wallet screening, ensure you have:- A Webacy API key (sign up here)
- Basic familiarity with REST APIs or the Webacy SDK
- Your application’s deposit/withdrawal flow identified for integration points
Deposit Screening
Every deposit is a potential liability until you verify the source. Screen every incoming deposit address to catch sanctioned entities, mixer activity, and high-risk wallets.Sanctions Check
The fastest compliance check—verify if an address is on OFAC or other sanctions lists.Full Risk Analysis
For addresses that pass sanctions screening, perform a comprehensive risk analysis.| Field | Description | Action |
|---|---|---|
overallRisk | 0-100 risk score | Set your threshold (e.g., >50 = review) |
issues[] | Array of risk tags | Check for specific threats |
labels[] | Entity labels | Identify mixers, exchanges, etc. |
Multi-Chain Support
The same endpoints work across all supported chains—just change thechain parameter.
Withdrawal Protection
Your users trust you to protect their funds—even from their own mistakes. Protect users from sending funds to risky destinations, including address poisoning attacks.Address Poisoning Detection
Address poisoning is a sophisticated attack where scammers create lookalike addresses to trick users into sending funds to the wrong destination. The Attack Pattern—Can You Spot the Difference?| Address | |
|---|---|
| ✅ Legitimate | 0xd9A1b0B1e1aE382DbDc898Ea68012FfcB2853a91 |
| ❌ Attacker | 0xd9A1C3788D81257612E2581A6ea0aDa244853a91 |
0xd9A1. Both end with 53a91. The victim couldn’t tell them apart—and lost $68 million.
Withdrawal Destination Check
Screen withdrawal destinations for general risk factors.Complete Integration Workflow
Here’s how it all fits together.Recommended Deposit Flow
Recommended Withdrawal Flow
Implementation Example
Full TypeScript Implementation
Full TypeScript Implementation
Example Addresses for Testing
Use these addresses to test your integration:OFAC Sanctioned Addresses
| Address | Chain | Attribution |
|---|---|---|
0x098B716B8Aaf21512996dC57EB0615e2383E2f96 | ETH | Lazarus Group (Ronin Bridge heist) |
0x566f827a4988d4a3eb9da469d8d3d0b536da196e | ETH | OFAC SDN List |
0x55da7813a4314cc896bf0cf61886529b7769be81 | ETH | OFAC SDN List |
bc1qy78e6ml7f3p438jqrrlzsewx625y0sr7jsesa7 | BTC | OpenSanctions |
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn | BTC | WannaCry Ransomware |
1295rkVyNfFpqZpXvKGhDqwhP1jZcNNDMV | BTC | Suex (OFAC) |
Known Hackers
| Address | Chain | Attribution |
|---|---|---|
0x3b09A3c9aDD7D0262e6E9724D7e823Cd767a0c74 | ETH | Bittensor Hack |
0x7a503e3ab9433ebf13afb4f7f1793c25733b3cca | ETH | GANA Hack |
0xd967113224c354600b3151e27aaba53e3034f372 | ETH | WazirX Malware/Spear Phishing |
0x889b49ef0bf787c3ddc2950bfc7d1d439320004b | ETH | Woo X Exploiter |
0x44f887cfbd667cb2042dd55ab1d8951c94bb0102 | ETH | Loopring Guardian 2FA Exploit |
bc1ql9r9a4uxmsdwkenjwx7t5clslsf62gxt8ru7e8 | BTC | Trust Hack |
Mixers & Money Laundering
| Address | Chain | Type |
|---|---|---|
0x722122dF12D4e14e13Ac3b6895a86e84145b6967 | ETH | Tornado Cash Router |
0x5614987586c15f4e9b3ebcbec07c477b58f2e59b | ETH | Tornado Cash Router (Primary) |
0x561376c5c8313bd742083d42e6b8b6d8da701fff | ETH | Tornado Cash Pool (100 ETH) |
Phishing & Scam Addresses
| Address | Chain | Attribution |
|---|---|---|
0x84672cc56b6dad30cfa5f9751d9ccae6c39e29cd | ETH | AI Protocol User Permit Phishing |
0x1aDf5DAc035AE7FEC116e8345e005FB88d542f53 | ETH | Phishing scammer |
0xe7d13137923142a0424771e1778865b88752b3c7 | ETH | Mailer Lite/WalletConnect Phishing Campaign |
0x624Fc3Dc249E37E8BFd3e834C4dF81Ff2dA1D0Ca | BSC | Malicious Permit scammer |
Address Poisoning
| Address | Chain | Type |
|---|---|---|
0xd9A1C3788D81257612E2581A6ea0aDa244853a91 | ETH | Known poisoned address ($68M WBTC attack) |
0xCF03Aa88AfDA357C837b9DDD38A678E3Ad7Cd5D7 | ETH | Poisoning victim |
0x5f90e59d0a03fd2f8c56b8cc896c5b42594eb3a0 | ETH | $50M address poisoning drain |
DPRK-Related (North Korea)
| Address | Chain | Attribution |
|---|---|---|
0x0fa09c3a328792253f8dee7116848723b72a6d2e | ETH | North Korean entities (High Risk) |
0x6eedf92fb92dd68a270c3205e96dccc527728066 | ETH | North Korean entities (High Risk) |
0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516 | ETH | North Korean entities (High Risk) |
Clean Addresses (for comparison)
| Address | Chain | Type |
|---|---|---|
0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045 | ETH | Vitalik’s wallet (low risk) |
For a complete list of test addresses, see Example Addresses.
API Quick Reference
| Endpoint | Use Case | Response Time |
|---|---|---|
GET /addresses/sanctioned/{address} | Sanctions screening | ~100ms |
GET /addresses/{address} | Full risk analysis | ~500ms |
GET /addresses/{address}/poisoning | Address poisoning check | ~300ms |
Ready to Ship?
You’ve seen how it works. Now integrate it:- Get your API key — Takes 2 minutes
- Test with the example addresses — Verify your integration
- Go live — Start screening deposits today
Next Steps
Get Your API Key
Start screening in minutes
API Reference
Every endpoint, every parameter
Install the SDK
TypeScript bindings included
Understanding Risk Tags
Know what you’re looking at
