AML Query
What is AML Query?
Cregis AML is a risk management feature that helps users to identify, control and mitigate on-chain risks and is implemented through integration with Elliptic, a renowned crypto risk control service provider. Cregis AML supports Know Your Address (KYA) and Know Your Transaction (KYT) analyses and allows users to run manual queries and auto queries. Users may choose suitable features and methods based on their business requirements and manage on-chain transaction risks in a more efficient way.
Cregis AML is only available to subscribed users. Please subscribe to a paid plan to utilize these features.
Cregis AML charges an additional fee for each query beyond the monthly subscription fee. Please make sure to have sufficient team balance.
Feature Description
Cregis AML provides two features, manual query and auto query, to meet users' needs under different scenarios.
Manual Query
Manual query enables users to conduct Know Your Address (KYA) and Know Your Transaction (KYT) analyses. Users are able to initiate an AML query on a wallet address or transaction, select a service provider to complete the query, and take appropriate risk control actions based on the query result.
To initiate a manual KYA query, users need to input the wallet address to be evaluated and the network it belongs to. Cregis AML then recognizes the entity associated with the target address. It also screens the source and destination of its fund, traces fund inflows and outflows, identifies the addresses and entities that have interacted with the targeted address, and analyzes their risk categories and characteristics. Source and destination risk exposure are estimated based on these analyses, and risk scores for source and destination of funds are calculated accordingly. The final risk score for the address is determined following the highest risk principle.
To initiate a manual KYT query, users need to select the direction of the query (incoming or outgoing), and input the network, receiving address and transaction hash of the transaction to be screened. Cregis AML will trace the source or destination of the funds involved in the transaction based on the user's selected direction, recognize entities linked to the funds and their risk profiles and characteristics, and calculate risk score for the transaction accordingly.
User Manual
Before using the AML query function, please ensure that you are a subscribed user. For subscription steps, please refer to this page.
Navigate to the AML Query Page and click "New Query", or click the icon next to address on the transaction detail page.


First, select the query type. For transaction queries, you need to enter the direction, network, recipient address, transaction hash, and service provider. For address queries, enter the network, address, and provider, and input the address you wish to query.

Please note that different service providers have varying fees and supported networks. You can click "Compare Service Providers" to view more details.

After clicking "View", the system will display a reminder message.

Then, you will need to enter your transaction password to complete verification.

After verification is completed, you can view the query results.

You may also check the details in record page including source risk score and destination risk score.

Auto Query
With auto query, Cregis AML helps users screen their API incoming transactions based on predefined rules, conduct risk analyses for transactions they care about most, and apply risk controls according to query results. Users need to create and manage their rules on the desktop application, while query results can be seen on both desktop applications and mobile applications.
To start auto query, users have to create query rule(s):
Set up triggered rules which specify projects, tokens and amounts for transaction monitoring. Users may create multiple rules, but can only create one rule for each project. Within each rule, different trigger amounts can be set for different tokens.
Define a specific risk control threshold based on business needs and risk preferences. Pick a number between 0 and 10.0 as the threshold, and Cregis AML will flag a transaction as dangerous when its risk score is higher than the threshold.
Pick one or more risk alert recipient. Cregis AML will send risk alerts to assigned recipient(s) when it identifies a dangerous transaction.
When a rule is configured and enabled, Cregis AML will automatically conduct Know Your Transaction analysis on incoming transactions that trigger the rule. Then Cregis AML assesses whether a transaction is dangerous according to the risk threshold in the rule it triggered. When a dangerous transaction is identified, Cregis AML will disable the receiving address, and send risk alerts to assigned alert recipient. If a project/address is disabled, Cregis AML will no longer screen any incoming transactions of the project/address until it's manually enabled.
When a dangerous transaction is identified, Cregis AML disables the incoming address, stops API callback and funds collection of the address, and sends risk alerts to assigned alert recipients. Users who receive a risk alert can proceed to review query details to learn about risk specifics. If the risk is within the acceptable range, users may manually push a callback and enable the address.
User Manual of setting up automatic AML queries
First, navigate to the following page and click "Create."

After clicking, you can begin creating a rule

Rule Name: Name your rule
API Project: Select the project whose transactions you want to monitor. Please note that only one rule can be applied to a project.
Token: Choose the cryptocurrency and set the minimum amount that will trigger an automatic AML query

Service Provider: Select the service provider you wish to use for the query.
Risk Classification Criteria: Can be set between 0.0 (Safe) - 10.0 (Extremely Risky). When a transaction's risk score exceeds your set threshold, it will be flagged as a risky transaction, triggering alert notifications and automatically disabling the project address.
Alert Recipients: Designate team members to receive risk alerts
After completing the settings, click "Submit" and complete identity verification to finalize the creation process. The rule must be enabled after successful creation before it becomes active.
All rule activities (creation, editing, enabling, and deletion) are logged and can be viewed in the log page.

Query Results
Address Query (KYA)
The results of manual query include a risk score and query details of fund source and fund destination.
Risk Score & Risk Level
The risk score of an address ranges from 0.0 to 10.0, and a higher score indicates a higher risk level. A risk score of 0 means that the relative risk is minimal, while a risk score of 10.0 signals an extremely high risk. The correspondence between risk scores and risk levels recommended by Elliptic is as follows.
[0,2.5]
Low/Safe
[2.5,7.5]
Medium/Suspicious
[7.5,10.0]
High/Dangerous
Please note that the risk classification criteria above is recommended by the service provider based on general scenarios, and it may not be suitable for users with specific risk control requirements. To ensure the security of funds and operations, users are advised to account for their own needs and circumstances and assess the risk profile of an address or transaction based on the risk score and query details.
Associated Entity & Label
Associated entity refers to the name of the corporation, organization, project or other entity that owns the target address. Entity label is a tag applied by the service provider that reflects the category or risk feature of the target address or associated entity, such as Exchange, Bank, Mixing Service, etc.
Associated entity and label help users to have a complete view on the risk profile of the target address. Cregis AML utilizes address label database to tag target addresses. Please refer to Appendix B or the lists of labels provided by Elliptic. When an address belongs to a self-custody wallet or individual wallet, or when the information about the associated entity is not included in the service provider's database, the associated entity and label will be displayed as unknown.
Query Details
Query details include information for fund source and destination. Cregis AML provides risk scores and risk-linked entities for both source and destination. Users can further review the risk category, contribution value, and contribution percentage of each risk-linked entity.
Source/Destination Risk Score Source/Destination risk scores are also assigned on a scale of 0.0-10.0. Higher risk scores indicate larger risks. The overall risk score of an address equals the higher value of source and destination risk scores.
Risk-linked Entity From the perspective of source risks, a risk-linked entity is an entity labelled as risky by Cregis AML that has sent funds to the address of interest. From the perspective of destination risks, a risk-linked entity is an entity labelled as risky by Cregis AML that has received funds from the address of interest. A risk-lined entity is usually an enterprise, an organization or a group. An entity that cannot be identified is shown as Unknown. Users can also review the details of risk-lined entities, including:
Risk Category The risk category is the type of risk an entity is linked to, such as Scam, Thief, Dark Service, etc. Cregis AML utilizes the address label database of our partner to determine the risk category of an entity. A summary of risk categories and descriptions can be found in the appendix.
Contribution Value From the perspective of source risks, contribution value refers to the amount of fund inflows from a risk-linked entity to the address of interest, priced in the US dollar. From the perspective of destination risks, contribution value refers to the amount of fund outflows from the address of interest to a risk-linked entity, priced in the US dollar.
Contribution Percentage The contribution percentage is the incoming/outgoing funds of a risk-linked entity as a proportion to the total incoming/outgoing funds, in percentage terms.
Transaction Query (KYT)
For transactions that trigger auto queries, Cregis AML provides risk scores and query details.
Risk Score
The risk score ranges from 0.0 to 10.0.
The risk score calculated by Elliptic is directly correlated with the contribution ratio of risky funds to the source of funds for the outgoing address. The higher the contribution ratio of risky funds, the higher the risk score. When multiple types of risks are detected, Elliptic adopts a Highest Risk Principle to calculate the risk score. The correspondence between the two is shown in the following table:
Risk Score
0.0
1.0
2.5
5.0
7.5
10.0
Contribution Ratio of Risky Funds
<1%
10%
25%
50%
75%
>99%
Query Detail
Query details show risk-linked entities of the sending address of the target transaction, i.e., risky entities which have sent funds to the sending address. Users can review the risk category, contribution value and contribution percentage of each risk-linked entity.
Risk Category The risk category is the type of risk an entity is linked to, such as Scam, Thief, Dark Service, etc. Cregis AML utilizes the address label database of our partner to determine the risk category of an entity. A summary of risk categories and descriptions can be found in Appendix A.
Contribution Value The contribution value is the amount of fund inflows to the sending address from a risk-linked entity, priced in the US dollar.
Contribution Percentage The contribution percentage is the proportion of funds received from a risk-linked entity to total funds received in percentage terms.
Use Case
Pre-transaction Risk Control
Pre-transaction risk control aims to identify, assess and control risks before making a transaction to avoid abnormal transactions caused by operational errors or malicious behaviors and prevent major financial losses. Users may conduct manual queries on receiving addresses before important transactions are made and learn about risk exposure. The risk exposure of a receiving address can be used as a preliminary risk indicator for the risk profile of the receiving address.
If the risk score of a receiving address is high, it is strongly recommended that users do not transact with it to avoid risks of financial loss as well as operational, legal and regulatory risks. If the risk score falls in the medium risk range, it is suggested that users should double check the entity of recipient and the security of receiving address by other means, and proceed with the transaction after the address is verified as safe.
Transaction Monitoring
Transaction monitoring employs automated technologies to screen and monitor transactions at low latency, identify potential risks and suspicious behaviors, and ensure transaction compliance and asset security. An inflow of risky assets may increase the risk exposure of the receiving address, which is a common risk factor in crypto transactions. For users with a high frequency of payment collections and uncertain sources of funds, the auto query feature enables real-time monitoring of incoming transactions. Cregis AML helps to identify potential risks and isolate respective receiving addresses, thus preventing greater losses caused by a spread of risk.
When a transaction is labelled as dangerous, Cregis recommends that users check and learn about the risk level of the transaction in a timely manner. In most cases, users are advised not to use the receiving address to avoid a spread of risk to other addresses. If the risk is assessed as acceptable, users may manually enable the receiving address.
Limitation of AML Feature
Cregis AML is NOT able to cover all risk factors. Cregis AML tracks and identifies risks based on the risk database provided by crypto risk management service providers such as Elliptic. The database covers 50 networks and includes over 6.4 billion addresses, transaction records and relative risk information. However, due to the limited scope of the database and the lag of data updates, it is not possible for Cregis AML to record and label every risky address and suspicious fund flows, and thus not all risk factors are identified. Users should use the query results as a reference to risk identification and management, rather than a sole piece of definitive evidence.
The results provided by Cregis AML are time-sensitive. Cregis AML adopts a risk assessment model based on historical behaviors. Risk is identified if and only if the address involved in the fund flow has a history of suspicious activities and has been marked accordingly. If the risky activities of an address are not detected or an activity happens after the query is completed, these risks cannot be captured in the query result. Therefore, query results provided by Cregis AML are a holistic evaluation of the known risky activities associated with the query target when the query is made. The results may not be used to predict future risk profiles. When users initiate queries at different times, the results may be different.
FAQ
Why did my query fail? What should I do when it fails? A query failure is usually caused by insufficient team balance or an error in the third party server. If it's caused by insufficient team balance, you can top up and conduct a manual query to learn about the risk level of the address of interest.

Is there a charge for a failed query? No. Failed queries will not be charged.
Why is my manual query results page showing no risk score or query details? This indicates that there is no record of any risky activities of the target address in the risk database. The target address might just be created and has no transaction records, and it's also possible that there are no records of fund interactions between the target address and flagged addresses in the database. Cregis AML labels such addresses as safe based on their historical records. However, users need to consider other risks such as scams and phishing attacks.
Why is my auto query results page showing no results? Reasons for empty results include: 1) information about this transaction has not been included in the database; 2) our database does not contain any risk information related to the source of funds for the queried transaction. In the second case, the transaction can usually be viewed as a safe one, but it is not possible to rule out all potential risks.
Why are there details for risk-linked entities while the risk score is 0.0? It means that the total amount of funds associated with all risk-linked entities accounts for less than 1% of total funds of the target address. Since the proportion of risky funds is very low, the risk score is determined to be 0.0.
Why is the contribution value of a risk-linked entity shown as 0.00 while the contribution percentage is positive? It happens when the inflow/outflow of funds of this entity is less than USD 0.01 and the total fund amount of the target address is less than USD 100. The proportion of risky funds to total funds exceeds 0.01%, and thus the contribution percentage is positive.
Appendix
Elliptic-Risk category, description and example
Risk Category
Description
Example
Criminal Organisation
A group of individuals engaged in organized crime
The Shadow Brokers
Coin Swap Service
Coin swap service with fixed exchange rate, which usually doesn't require login or KYC
Credit Card Data Vendor
Online card vendor that provides illegal credentials and other illegal personal financial information
JokerStash.store
Dark Forum
TOR-only online forum
DNM Avengers
Child Sexual Abuse Material Vendor
Vendor that provides child sexual abuse materials in exchange for crypto assets
Dark Market-Centralized
TOR-only market that sells illegal goods and services via centralized infrastructure
Dream Market
Dark Market-Decentralized
TOR-only market that sells illegal goods and services via decentralized infrastructure
Wall Street Market
Dark Service
Illegal service, including hackers, wallets and web hosting services
PinPays
Dark Vendor Shop
TOR-only individual vendor in the dark market that sells illegal goods and services
Euroarms
Extortion
Entity obtaining funds from individuals or groups by means of force or threat
Ashley Madison Extortion
Far-Left/Far-Right Extremism
Entity which, (a) convicted of crimes directly related to far-left/ far-right extremist activities, or (b) identified and verified by multiple legal sources (with evidence) that has long been inciting violence, sexual abuse or other major crimes like far-left/ far-right extremist speech
High Transaction Fee
Entity involved in above-average transaction fees related to miners, which could be signs of losses or crimes
Known Criminal
Individual known to be engaged in illegal activities. Usually associated with criminal organizations.
Ross Ulbricht and Carl Mark Force
Malware
Software aiming to impair or disable computers and computer systems
Trickbot
OFAC Sanctioned Entity
Entity sanctioned by the Office of Foreign Assets Control (OFAC) of the US Department of the Treasury
Phishing
A fraudulent activity in which the message sender attempts to deceive the recipient into leaking important personal information, transferring funds or installing malwares. The message sender usually impersonates a representative of a legal organization
TRON Web Wallet Phishing
Ponzi Scheme
A fraudulent activity in which original investors get rapidly paid off by funds from later investors so as to cultivate a belief in the success of a company that doesn't exist
Ransomware
Cryptovirology-based malware that threatens to publish victims' data or terminate access to the data unless a ransom is paid
WannaCry 2.0
Scam
Any other type of fraudulent activities
Prodeum
Terrorist Organization
Organization involved in terrorism or related activities
ISIS
Thief
Recipient of stolen funds
Stolen CoinSecure Funds
Elliptic-Entity labels
ATM
Automated teller machines (ATMs) that allow the purchase or sale of crypto assets using fiat currency
Forum
Online discussion forum
Authentication
A service that allows users to prove their unique identity when accessing specific websites without entering login credentials, thereby enhancing security.
Gambling
Gambling service
Bitcoin Faucet
Websites that give away free Bitcoin or reward users with Bitcoin for completing tasks.
Hardware Wallet
Physical hardware wallets used to store crypto assets
Bridge
Contracts or services used to transfer assets from one blockchain to another
High Transaction Fee
Entity involved in above-average transaction fees related to miners, which could be signs of losses or crimes
Broker
Entities that represent clients in the buying and selling of crypto assets but do not maintain an order book
Hosting
Web hosting services
Charity
Non-profit or charitable organizations that accept Bitcoin donations
Investment Syndicate
Group investment providers, such as crypto asset risk operators or multi-level marketing schemes
Child Sexual Abuse Material Vendor
Vendor that provides child sexual abuse materials in exchange for crypto assets
Known Criminal
Individuals known to be engaged in illegal activities. Usually associated with criminal organizations.
Coin Swap Service
Coin swap service with fixed exchange rate, which usually doesn't require login or KYC
Law Enforcement
Known law enforcement
Credit Card Data Vendor
Online carding shops that provide illegal credentials and other illicit personal financial information
Layer 2
Blockchain scaling solutions built on Layer 1 blockchains
Crypto Exchange
Exchanges where customers can only trade crypto assets in exchange for other crypto assets
Malware
Software aiming to impair or disable computers and computer systems
Criminal Organization
A group of individuals engaged in organized crime
Marijuana Vendor Shop
Cannabis dispensaries registered in regulated jurisdictions
Dark Forum
TOR-only online forum
Merchant
Online legal sellers or vendors
Dark Market-Centralized
TOR-only market that sells illegal goods and services via centralized infrastructure
Microtransaction Service
Websites that facilitate microtransactions, such as freelance platforms or browser plugins that generate crypto assets
Dark Market-Decentralized
TOR-only market that sells illegal goods and services via decentralized infrastructure
Mine
Newly minted crypto assets created as part of the mining/validation process
Dark Service
Illegal service, including hackers, wallets and web hosting services
Miner
Services for mining and generating new crypto assets
Dark Vendor Shop
TOR-only individual vendor in the dark market that sells illegal goods and services
Misc Service
Various uncategorized services, vendors, or organizations
Data
Vendors that provide data to end users
Mixer
Services used for privacy or money laundering purposes that allow crypto assets to be mixed or obfuscated to anonymize funds
DeFi
Decentralized financial platform
News
Online news releasing service
Decentralized Exchange
A decentralized service that provides cryptocurrency-to-cryptocurrency exchange
NFT Marketplace
让创作者能够向用户出售NFT的市场
Entertainment
Vendors that provide streaming media, television, movies, and other entertainment services
OFAC Sanctioned Entity
Entity sanctioned by the Office of Foreign Assets Control (OFAC) of the US Department of the Treasury
Escrow
Vendors that provide escrow services for transactions between two parties
Outsourcing Provider
Websites that facilitate freelance opportunities
Exchange
Centralized service providers that offer fiat-to-crypto and crypto-to-crypto exchange services
Payment Service Provdier
Online payment service providers that accept multiple payment methods
Extortion
Entity obtaining funds from individuals or groups by means of force or threat
Peer to Peer Exchange
Platforms where individual buyers and sellers can exchange crypto assets for other assets
Far-Left/Far-Right Extremism
Entity which, (a) convicted of crimes directly related to far-left/ far-right extremist activities, or (b) identified and verified by multiple legal sources (with evidence) that has long been inciting violence, sexual abuse or other major crimes like far-left/ far-right extremist speech
Phishing
A fraudulent activity in which the message sender attempts to deceive the recipient into leaking important personal information, transferring funds or installing malwares. The message sender usually impersonates a representative of a legal organization
Financial Service
Financial service organizations that provide loans, bonds, derivatives, and other financial products
Research Chemicals
Bulk chemical retailers for laboratory use only
Political Campaign
Political campaign or organization
Scam
Any other type of fraudulent activities
Ponzi Scheme
A fraudulent activity in which original investors get rapidly paid off by funds from later investors so as to cultivate a belief in the success of a company that doesn't exist
Shielded
Shielded addresses use cryptographic techniques to conceal on-chain information such as the sender's address and transaction amount
Privacy Wallet
Cryptocurrency wallets that help users avoid blockchain deanonymization features
Software Wallet
Intangible software wallets used to store crypto assets
Ransomware
Cryptovirology-based malware that threatens to publish victims' data or terminate access to the data unless a ransom is paid
Terrorist Organization
Organization involved in terrorism or related activities
Reported Loss
Losses caused by disruptions or forks
User
A forum or social mediauser
Thief
Recipient of stolen funds
Validator
Nodes responsible for executing transactions on the blockchain
Token
Representations of specific assets, utilities, intangible assets, or crypto assets
Venture Capital
Venture capital organizations that work with startups, early-stage companies, and emerging companies considered to have high growth potential
Token Sale
Crowdfunding, presales, or other sales related to the launch of tokens or other crypto assets
VPN Vendor
Providers of Virtual Private Network (VPN) services
Trading Platform
Providers of exchange software and services that do not operate exchanges
Last updated
Was this helpful?