How It Works
All transactions are screened in real time against:- Third-Party Integrations: Professional-grade sanctions and risk databases, including HackBounty and Chainalysis, used to identify addresses linked to malicious activity and ensure regulatory compliance.
- Relay’s Internal Blocklist: Continuously maintained and updated by our compliance team based on emerging threats and intelligence.