v1 · Public · Free

Ozone Screening API

One endpoint. Every sanctions list. Screen any address against OFAC, EU sanctions, known hacks, Tether frozen wallets, and 5,000+ flagged entities — zero auth required.

GET /api/screen
ParameterTypeDescription
addressstringAny address — thor1..., 0x..., bc1..., T..., r...
Flagged Response
{
  "address": "thor1abc...xyz",
  "flagged": true,
  "matches": [
    {
      "address": "0x1234...abcd",
      "chain": "ETH",
      "source": "OFAC",
      "entityName": "Lazarus Group",
      "reason": "OFAC SDN List"
    }
  ]
}
Clean Response
{
  "address": "thor1qpx...m4g",
  "flagged": false,
  "matches": []
}

Integration Examples

cURL
curl "https://ozone.redacted.money/api/screen?address=thor1..."
JavaScript
const res = await fetch(
  "https://ozone.redacted.money/api/screen?address=" + address
);
const { flagged, matches } = await res.json();

if (flagged) {
  // Block transaction
  console.log("Address is sanctioned:", matches);
}
Python
import requests

r = requests.get(
    "https://ozone.redacted.money/api/screen",
    params={"address": address}
)
data = r.json()

if data["flagged"]:
    print(f"BLOCKED: {data['matches']}")

Try it live

Test any address against all compliance lists in real-time.

GET /api/flagged

Returns the full dataset of all flagged THORChain addresses with their linked L1 addresses and flag reasons. Available as JSON or CSV.

Data Sources

OFAC SDN
US Treasury sanctions
EU Sanctions
European Union list
Known Hacks
Bybit, Ronin, Nomad...
Tether Frozen
ETH + TRON blacklist
ScamSniffer
Phishing database
Eth Labels
Exploits & heists
Chainalysis
Sanctions oracle
Manual Flags
Team-reviewed