Overview
As cryptocurrency goes mainstream, compliance requirements are increasingly strict. ChainStream provides comprehensive security and compliance solutions to help businesses meet regulatory requirements, identify risky transactions, and protect user assets.KYT - Know Your Transaction
Real-time analysis of transaction fund sources and destinations to identify high-risk associations
KYA - Know Your Address
Assess wallet address risk levels and associated entities
Why On-chain Compliance
Regulatory Requirements
Regulatory Requirements
Major jurisdictions (US, EU, Singapore, Hong Kong, etc.) have clear AML/CFT compliance requirements for crypto exchanges and service providers.
Risk Control
Risk Control
Identify and block:
- Hack-related funds
- Ransomware payments
- Mixer and privacy protocol associations
- Scam and phishing addresses
User Protection
User Protection
- Prevent users from interacting with high-risk addresses
- Provide token security checks
- Identify honeypots and rug pulls
ChainStream Compliance Capabilities
KYT (Know Your Transaction)
Risk assessment for individual transactions: Core Features:- Transaction risk scoring
- Fund source/destination tracing
- Entity identification
- Alert generation
KYA (Know Your Address)
Risk assessment for wallet addresses:- Address risk rating
- Historical behavior analysis
- Entity identification
- Label classification
Coverage
Supported Chains
| Chain | KYT | KYA | Notes |
|---|---|---|---|
| Ethereum | Full | Full | Including ERC-20 |
| BSC | Full | Full | Including BEP-20 |
| Polygon | Full | Full | |
| Arbitrum | Full | Full | |
| Solana | Full | Full | SPL tokens |
| Tron | Full | Full | TRC-20 |
| Bitcoin | Partial | Partial | Mainnet |
Risk Categories
ChainStream can identify the following risk categories:| Category | Description | Risk Level |
|---|---|---|
| Sanctions | Sanctioned entities/addresses | Severe |
| Darknet | Darknet market associations | Severe |
| Ransomware | Ransomware associations | Severe |
| Hacking | Hack-related funds | Severe |
| Fraud | Scam/phishing associations | High |
| Mixer | Mixer/privacy protocol | High |
| Gambling | Gambling platforms | Medium |
| High Risk Exchange | High-risk exchanges | Medium |
Integration
KYT/KYA uses a Register + Query two-step model: first register a transaction or address, then query the assessment results after the system completes risk analysis.- Transaction Risk (KYT)
- Address Risk (KYA)
- Integration Example
Step 1: Register TransferStep 2: Query Results
Use Cases
Deposit Monitoring
Assess fund source risk during deposits to block problematic funds
Pre-withdrawal Check
Evaluate destination address risk before withdrawals to prevent funds flowing to sanctioned entities
Wallet Screening
Check wallet history risk during user registration or KYC
Compliance Reporting
Generate regulatory-compliant transaction monitoring reports

