visit
NTerminal Sources identifying US Sanctioned addresses
Timeline of newly sanctioned addresses by US Government.
Newly sanctioned addresses are added to NTerminal, then enriched with a number of other sources such as CipherTrace to identify the country of origin, any known abuse reports, and risk scores. Addresses transacting with sanctioned entities following the date of sanctioning can be identified and visualized using a number of Splunk based graphical tools.The visualization tool in Splunk allows users to graph directional relationships between blockchain addresses. Using time series data within NTerminal, transactions following the sanction date for a particular entity can be mapped using the Link Analysis tool.
Attribution data for US sanctioned addresses, with identified inflow and outflow addresses.
Directional relationships between addresses can identify addresses associated with a sanctioned entity, which might be used following a sanction event to relocate funds. Using the Sankey diagram the weight of these connections can be visualized for in-depth CTF and AML investigations.Transaction flow in NTerminal using Sankey diagram and CipherTrace attribution.
can be used to identify points of exchange, convergence between distributed funds and new storage addresses for sanctioned entities.Link analysis can be effective for not only relating new addresses to sanctioned entities but also characterizing relationships between CipherTrace risk tagged addresses. Using flagged transactions and addresses, link analysis functionality can correlate dark market participants with gambling services, risk tagged exchanges, and regulated USD markets.Link analysis within NTerminal using CipherTrace attribution to identify bitcoin pipelines moving funds through dark markets, gambling services, high risks exchanges and regulated USD markets.
Highlighting dark market associated addresses through link analysis and CipherTrace attribution. Connected addresses can then be flagged as dark market participants and related to other tagged services.
In addition to the link analysis tool, the can be used to graphically represent relationships between addresses and tagged entities by the value and quantity of transactions, CipherTrace risk scores, and associations to illicit activity. Using the same data represented above, relationships between unknown addresses with risky entities and services can be visualized and aggregated in 3 dimensional space.Network topology of addresses with associations to dark markets and high risk exchanges. Additional addresses with associations to smart contracts and gambling services.
These graphs can be used to determine the associated risk and behavior of blockchain addresses based on proximity and connection strength to tagged entities. Graph network topology visualizations allows users and NTerminal analysts to construct risk and compliance scoring calculations based on the number and strength of connections to highlighted entities through CipherTrace.Sunburst diagram reflecting fund tracking and risk coloring of Hack associated addresses.
Similarly, Sankey diagrams within NTerminal can be used in tandem with CipherTrace attribution to trace transactions sequentially in order to follow the movement of funds between entities, countries, and services on the blockchain.Use Sankey diagrams to trace the flow of transactions between addresses as they related to CipherTrace tagged hack addresses.
These investigative visualization tools enriched with CipherTrace data are brought together into one comprehensive analysis framework within NTerminal. Explore a number of KYC and KYT use cases for criminal investigations, compliance, network research and more through NTerminal's blockchain forensics suite.