Skip to content

Known Entities Database

The scanner maintains a curated database of known Solana addresses to identify privacy-relevant interactions.

Current Database (15 Addresses)

Centralized Exchanges (4)

Interactions with CEXs create HIGH privacy risk because:

  • They link on-chain addresses to real-world identities through KYC
  • They collect IP addresses, device fingerprints, and behavior data
  • They can be compelled to share data with authorities
NameAddressRisk Level
Binance Hot Wallet5tzFkiKscXHK5ZXCGbXZxdw7gTjjD1mBwuoFbhUvuAi9HIGH
FTX Hot Wallet (defunct)2ojv9BAiHUrvsm9gxDe7fJSzbNZSJcxZvf8dqmWGHG8SHIGH
Bybit Hot WalletH8sMJSCQxfKiFTCfDR3DUMLPwcRbM61LGFJ8N4dK3WjSHIGH
Coinbase Custody9WzDXwBbmkg8ZTbNMqUxvQRAyrZzDsGYdLVL9zYtAWWMHIGH

Cross-Chain Bridges (3)

Bridge interactions create MEDIUM privacy risk because:

  • They link activity across multiple blockchains
  • They reveal cross-chain transaction patterns
  • Some bridges collect additional metadata
NameAddressDescription
Wormhole Token BridgewormDTUJ6AWPNvk59vGQbDvGJmqbDTdgWgAqcLBCgUbCross-chain bridge
Wormhole NFT BridgeWnFt12ZrnzZrFZkt2xsNsaNWoQribnuQ5B5FrDbwDhDNFT cross-chain bridge
AllbridgeBBnraYq3M9GqTWDH5ZZ4H8hW8q3wMnRqmqo9AJZLfrdxMulti-chain bridge

DeFi Protocols (3)

Protocol interactions are informational - they reveal usage patterns but don't directly link identities:

NameAddressDescription
Jupiter Aggregator v6JUP6LkbZbjS1jKKwapdHNy74zcZ3tLUZoi5QNyVTaV4DEX aggregator
Orca WhirlpoolswhirLbMiicVdio4qvUfM5KAg6Ct8VwpYzGff3uctyCcConcentrated liquidity DEX
Raydium AMM v4675kPX9MHTjS2zt1qfr1NYHuzeLXfQM9H24wFSUt1Mp8Automated market maker

NFT & Core Programs (5)

These are system-level programs that appear in most transactions:

NameAddressType
Metaplex Token MetadatametaqbxxUerdq28cj1RbAWkYQm3ybzjb6a8bt518x1sNFT metadata
Magic Eden v2M2mx93ekt1fmXSVkTrUL9xVFHkmME8HTUi5Cyc5aF7KNFT marketplace
SPL Token ProgramTokenkegQfeZyiNwAJbNbGKPFXCWuBvf9Ss623VQ5DACore program
Associated Token AccountATokenGPvbdGVxr1b2hvZbsiqW5xWH25efTNsLJA8knLCore program
System Program11111111111111111111111111111111Core program

How Known Entities Are Used

1. Detection

When you scan a wallet, the scanner:

  1. Loads the known entities database
  2. Checks all transaction counterparties against the database
  3. Matches any addresses that appear

2. Reporting

Known entities appear in two places:

"KNOWN ENTITIES DETECTED" Section:

KNOWN ENTITIES DETECTED
───────────────────────────────────────────────────────────────

Exchanges:
  • Binance Hot Wallet
    Binance centralized exchange hot wallet

DeFi Protocols:
  • Jupiter Aggregator v6
    Jupiter DEX aggregator program

"Known Entity Interaction" Risk Signal (if transfers occurred):

1. Known Entity Interaction [HIGH]

   Evidence:
   • 3 interaction(s) with Binance Hot Wallet (exchange)
   • 1 interaction(s) with Wormhole Token Bridge (bridge)

Why We Track These

Exchanges: Identity Linkage

When you deposit/withdraw from a CEX:

  • They know your real identity (KYC)
  • They can see your deposit address
  • Result: Your on-chain address is linked to your real-world identity

Bridges: Cross-Chain Tracking

When you use a bridge:

  • Both source and destination chains see the transaction
  • Pattern analysis can link your addresses across chains
  • Result: Your activity on multiple blockchains can be correlated

Protocols: Usage Patterns

When you interact with labeled protocols:

  • Reveals your DeFi/NFT usage patterns
  • Can create behavioral fingerprints
  • Result: Helps build a profile of your on-chain activity

Privacy Levels

Entity TypePrivacy RiskReason
CEXHIGHDirect identity linkage via KYC
BridgeMEDIUMCross-chain tracking, some metadata
ProtocolLOW-INFOUsage patterns only, no direct identity link
Core ProgramsNONEUniversal, appears in almost all transactions

Community Growth

The database starts small (15 addresses) but is designed to grow through community contributions.

Want to add an address? See Contributing Addresses

Limitations

Important Limitations

  • Not exhaustive: Only tracks a curated subset of addresses
  • Static: No real-time updates from on-chain registries (yet)
  • Focused: Prioritizes privacy-relevant entities, not comprehensive coverage
  • Conservative: Better to miss some entities than include unverified ones

Future Enhancements

Potential improvements:

  • API-based label providers (on-chain registries)
  • User-provided custom label files
  • Automatic address discovery via on-chain data
  • Confidence scores for label accuracy

Built for privacy awareness. Not surveillance.