About
Powering crypto compliance for governments, financial institutions, and crypto businesses. Connect cryptocurrency transactions to real-world entities using public blockchain attribution data. Monitor risk on millions of addresses. Investigate fraudulent activity across Bitcoin, Ethereum, and more. Coinbase Analytics sources its information from public sources and does not make use of Coinbase user data. Investigate and visualize cryptocurrency flows. Understand how different counterparties are connected. Use custom notes and annotations to share findings. Plot multiple ERC-20 tokens on the same graph. Reduce fraud, understand counterparty risk, and satisfy AML requirements. Monitor incoming and outgoing transactions. Receive risk scores and alerts on suspicious transactions. Look up addresses and transactions to understand which entities control a wallet. Advanced tools to identify mixers and peeling chains.
|
About
Crystal is the all-in-one blockchain investigative tool. Designed for law enforcement and financial institutions, Crystal provides a comprehensive view of the public blockchain ecosystem and uses advanced analytics and data scraping to map suspicious transactions and related entities. Whether it is tracking a bitcoin transaction to a real-world entity, determining relationships between known criminal actors, or surveying suspicious online behavior, Crystal can help move your investigation forward. Crystal provides crypto transaction analysis and monitoring for exchange, bank, and FI AML compliance requirements. We design best-in-class analytics and investigation solutions to make the blockchain transparent for crypto businesses, banks, financial institutions, and government and law agencies. We analyze and monitor blockchain transactions. We notify you of potentially irregular activities. We help you to comply with regional regulations.
|
About
The Java™ Programming Language is a general-purpose, concurrent, strongly typed, class-based object-oriented language. It is normally compiled to the bytecode instruction set and binary format defined in the Java Virtual Machine Specification. In the Java programming language, all source code is first written in plain text files ending with the .java extension. Those source files are then compiled into .class files by the javac compiler. A .class file does not contain code that is native to your processor; it instead contains bytecodes — the machine language of the Java Virtual Machine1 (Java VM). The java launcher tool then runs your application with an instance of the Java Virtual Machine.
|
About
Real-time KYC/AML for easy compliance and effective monitoring KYC/AML platform that gives deep insights into every transaction, empowering you to make informed decisions. Building trust and making compliance easy. Financial crime insight that puts you in control. We help our customers experience the most insightful and powerful tools for AML compliance. Target Customers. Financial Institutions, Blockchain Industries, Governments. UnBlockGUI - Investigation. Software Suite Automate. Know Your Customer and Know Your Transaction (KYC & KYT) process and reduce false positives by 90% Identify Suspicious People. Search who’s behind the cryptocurrency address. Simply enter any cryptocurrency address into UnBlockGUI search bar and it will automatically perform a graph search to identify nearby suspicious persons or groups. Insightful Finding Investigation. Document your investigation process in UnBlockGUI to provide a clear record of your findings. Evidence from UnBlock
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Governments, financial institutions, and crypto businesses that need crypto compliance tools
|
Audience
Agencies and organizations interested in a blockchain investigative tool to map suspicious transactions and related entities
|
Audience
Developers looking for a Programming Language solution
|
Audience
Businesses interested in a KYC/AML solution into every transaction problem
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationCoinbase
Founded: 2012
United States
www.coinbase.com/analytics
|
Company InformationCrystal Blockchain
Founded: 2018
Netherlands
crystalblockchain.com/
|
Company InformationOracle
docs.oracle.com/javase/8/docs/technotes/guides/language/index.html
|
Company InformationUnBlock Analysis
United States
www.unblock-analysis.com
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
Categories |
Categories |
|||
AML Features
Behavioral Analytics
Case Management
Compliance Reporting
Identity Verification
Investigation Management
PEP Screening
Risk Assessment
SARs
Transaction Monitoring
Watch List
|
||||||
Integrations
Amazon Q
Apache TomEE
Azure Database for MySQL
Codacy
DXcharts
Gemini 3 Pro
ImageJ
Kiuwan Code Security
Massive
OpenAI o3
|
Integrations
Amazon Q
Apache TomEE
Azure Database for MySQL
Codacy
DXcharts
Gemini 3 Pro
ImageJ
Kiuwan Code Security
Massive
OpenAI o3
|
Integrations
Amazon Q
Apache TomEE
Azure Database for MySQL
Codacy
DXcharts
Gemini 3 Pro
ImageJ
Kiuwan Code Security
Massive
OpenAI o3
|
Integrations
Amazon Q
Apache TomEE
Azure Database for MySQL
Codacy
DXcharts
Gemini 3 Pro
ImageJ
Kiuwan Code Security
Massive
OpenAI o3
|
|||
|
|
|
|
|