Direct touchpoints
The obvious layer: known sanctioned entities, blocked services, and listed counterparties with immediate regulatory consequence.
Identify direct and multi-hop proximity to sanctioned and high-risk clusters
Direct interaction with sanctioned entities is an obvious risk, but indirect exposure through mixers, shadow services, and multi-hop paths is where the true compliance danger lies.
The obvious layer: known sanctioned entities, blocked services, and listed counterparties with immediate regulatory consequence.
The operationally dangerous layer: two to five hop proximity through mixers, bridges, or shadow intermediaries that standard screening misses.
The defensible layer: path-aware logic showing exactly how exposure traveled so the result can survive audit and escalation.
This page is built for compliance and risk teams that need to explain indirect sanctions exposure, not just show a yes or no watchlist match.
Immediate interaction with attributed entities is easy to flag. It is also the least interesting problem operationally.
The real risk sits in recursive movement through mixers, high-risk VASPs, bridges, and shadow services that create material proximity without direct contact.
Teams need a path-aware exposure record that can be escalated to compliance, audit, or regulators with the reasoning intact.
We perform a graph-based propagation analysis, tracing funds multiple hops away from known sanctioned clusters. This reveals the "gravity" of exposure that simple flat-file screenings miss.
Proprietary exposure modeling that identifies "financial proximity" to sanctions, even through obfuscation.
Algorithms designed to track capital movement through standardized mixer outputs and temporal alignment.
Industry-leading multi-hop tracing that maintains accuracy and low false-positives across 10+ hops.
Initial direct screening against global sanctions watchlists (OFAC, EU, UN, etc.).
Expanding the search to identify indirect exposure 2-5 hops away from the source.
Tagging indirect counterparties as known high-risk zones, such as illicit mixers or shadow VASPs.
Generating a detailed evidence trail showing the exact path of capital between entities.
Ensure full regulatory compliance by catching the indirect exposure risks that standard point-in-time checks consistently miss.
Use this route when the team needs to review indirect exposure logic and escalation standards.
Book sanctions reviewUse this route when a wallet, counterparty, or treasury flow needs immediate indirect exposure analysis.
Open exposure escalation