What is transaction monitoring?

Transaction monitoring is the process of analyzing financial transactions in real time or near-real time to identify activity that may indicate money laundering, terrorist financing, sanctions violations, fraud, or other financial crime. In traditional banking and financial services, transaction monitoring is a core component of every institution’s anti-money laundering (AML) compliance program. In the cryptocurrency and digital asset sector, transaction monitoring has evolved into a discipline known as Know Your Transaction (KYT)—the on-chain equivalent of traditional AML monitoring, applied to blockchain transactions across hundreds of networks and protocols.

Transaction monitoring systems analyze customer transaction data against defined risk parameters, behavioral baselines, and watchlists to flag suspicious transactions for human review. When a flagged transaction meets the threshold for a suspicious activity report (SAR), compliance officers document and file it with the appropriate regulator—FinCEN in the United States, or equivalent financial intelligence units globally. For cryptocurrency businesses, VASPs, and financial institutions with digital asset exposure, crypto transaction monitoring extends these obligations to on-chain activity: screening blockchain transactions against sanctions lists, risk-scoring wallet counterparties, and detecting behavioral patterns consistent with illicit use.

For any organization subject to AML obligations—banks, exchanges, payment processors, crypto businesses, or financial institutions expanding into digital assets—transaction monitoring is not optional. It is the operational backbone of a defensible compliance program and the primary mechanism for detecting financial crime before it causes regulatory, reputational, or legal harm.

Why does transaction monitoring matter?

Transaction monitoring sits at the intersection of legal obligation, operational risk management, and financial crime prevention. For regulated institutions, inadequate transaction monitoring is not just a compliance gap—it is an enforcement exposure that has resulted in billions of dollars in regulatory penalties and, in severe cases, criminal prosecution of compliance leadership.

In the United States, the Bank Secrecy Act (BSA) requires financial institutions to maintain AML programs that include transaction monitoring capable of detecting and reporting suspicious activity. FinCEN has issued explicit guidance on what constitutes an adequate transaction monitoring program, including requirements for risk-based rule calibration, alert investigation procedures, and SAR filing protocols. The Financial Action Task Force (FATF) Recommendations—the global standard for AML/CFT programs—require member jurisdictions to impose transaction monitoring obligations on financial institutions and, increasingly, virtual asset service providers (VASPs).

Failure to maintain adequate transaction monitoring systems has triggered some of the largest regulatory penalties in banking history. FATF Recommendation 10 requires customer due diligence and ongoing monitoring. Recommendation 20 requires reporting of suspicious transactions. Recommendation 16—the Travel Rule—requires financial institutions and VASPs to transmit originator and beneficiary information alongside qualifying transactions. Each of these obligations depends on effective transaction monitoring as the detection layer.

Scale of Financial Crime

The scale of the problem transaction monitoring exists to address is substantial. The United Nations Office on Drugs and Crime estimates that between 2% and 5% of global GDP is laundered annually—approximately $800 billion to $2 trillion by conservative estimates. Financial crime exploits the volume and complexity of modern transaction flows: high-frequency payment rails, cross-border transfers, shell company structures, and increasingly, blockchain-based digital assets. Transaction monitoring systems must operate at a scale and speed that manual review cannot approach, analyzing thousands of transactions per second against hundreds of risk rules and entity watchlists.

The Cryptocurrency Dimension

Cryptocurrency has introduced a new dimension to transaction monitoring that traditional AML systems were not designed to address. Blockchain transactions operate on public ledgers, creating an unprecedented data transparency that is simultaneously an investigative asset and an analytical challenge: the volume, velocity, and technical complexity of on-chain activity requires purpose-built monitoring infrastructure. Illicit actors have exploited cryptocurrency for ransomware payments, darknet market proceeds, sanctions evasion, and large-scale laundering operations. Chainalysis research identified $40.9 billion in illicit on-chain activity in 2024—a figure that underscores why crypto-specific transaction monitoring is a compliance imperative, not an optional enhancement.

How does transaction monitoring work?

A transaction monitoring system (TMS) combines automated detection logic, risk scoring, and case management workflows to move from raw transaction data to actionable compliance decisions. The process follows a consistent lifecycle across both traditional finance and cryptocurrency environments.

# Stage What Happens
01 Data Collection and Integration The TMS ingests transaction data from core banking systems, payment processors, or—for crypto monitoring—directly from blockchain nodes. Data quality and completeness at this stage determine the reliability of every detection output downstream.
02 Customer Risk Profiling Each customer’s baseline risk profile is established at onboarding through KYC procedures and updated continuously based on transaction behavior. Risk profiles segment customers into tiers that determine monitoring intensity and alert thresholds.
03 Rule-Based Screening Transaction monitoring rules define the conditions that trigger alerts: thresholds on transaction amounts, velocity patterns, geographic risk, counterparty type, and behavioral anomalies. Rule sets are calibrated to the institution’s customer base and risk appetite and updated regularly to reflect evolving typologies.
04 Risk Scoring and Behavioral Analysis Beyond static rules, advanced TMS platforms apply machine learning models that score transactions against behavioral baselines. Deviations from a customer’s established pattern—unusual transaction amounts, atypical counterparties, unexpected geographies—generate risk signals that supplement rule-based triggers.
05 Alert Generation Transactions that meet defined rule or scoring thresholds generate alerts for human review. Alert management is the primary operational challenge in transaction monitoring: high false positive rates create analyst workload that reduces the quality of genuine suspicious transaction investigation. Effective systems calibrate rules to minimize false positives while maintaining sensitivity to genuine risk.
06 Case Management and Investigation Compliance analysts review alerts, conduct investigations, and make disposition decisions: clear, escalate, or file a SAR. Case management systems document the investigation process and provide the audit trail regulators require. Well-designed workflows route alerts to analysts based on expertise and workload, and integrate with external databases for enhanced due diligence.
07 SAR Filing and Regulatory Reporting When investigation confirms suspicious activity, the compliance officer prepares and files a SAR with the relevant financial intelligence unit. SAR narratives must document the suspicious behavior, the investigation conducted, and the factual basis for the filing. Accurate, timely SAR filing is both a legal obligation and an enforcement asset—SARs contribute to law enforcement investigations and broader financial intelligence efforts.
08 Continuous Optimization Transaction monitoring programs are not static. Rule sets require ongoing tuning to address false positive rates, emerging criminal typologies, and changes in the institution’s customer base or transaction volumes. Regulatory examinations evaluate the adequacy of monitoring programs, including how institutions identify and address deficiencies.

Transaction Monitoring Rules and Scenarios

Transaction monitoring rules define the specific conditions—thresholds, patterns, and behavioral signals—that trigger an alert for compliance review. Common rule categories include: transaction amount thresholds (transactions above reporting or structuring thresholds), velocity rules (multiple transactions within a defined timeframe), geographic risk rules (transactions involving high-risk jurisdictions), counterparty risk rules (transactions with politically exposed persons, sanctioned entities, or high-risk categories), and structuring detection (transactions just below reporting thresholds, indicative of intentional evasion). Effective transaction monitoring scenarios reflect an institution’s specific risk profile—a crypto exchange faces different typologies than a retail bank, and rules must be calibrated accordingly.

Real-Time vs. Batch Monitoring

Real-time transaction monitoring screens transactions as they occur, enabling compliance teams to block or hold suspicious transactions before they settle. This is particularly valuable for payment processors, exchanges, and any institution operating in high-velocity payment environments. Batch monitoring processes accumulated transaction data at intervals—typically overnight—and is more common in legacy banking infrastructure where real-time processing is technically constrained. For cryptocurrency transaction monitoring, real-time is the operational standard: blockchain transactions settle in seconds to minutes, making post-hoc batch review insufficient for proactive compliance.

AI and Machine Learning in Transaction Monitoring

AI-powered transaction monitoring uses machine learning models to detect anomalous transaction patterns that static rules would miss. Supervised models trained on historical SAR data learn to identify the behavioral signatures of suspicious activity; unsupervised models detect anomalies by identifying deviations from established customer behavioral baselines. The primary operational benefit is false positive reduction: AI models can screen out low-risk alerts that would otherwise generate analyst workload, allowing compliance teams to focus review on genuinely suspicious transactions. For crypto transaction monitoring, machine learning is applied to graph analysis—identifying clustering patterns, behavioral heuristics, and entity attribution signals that connect pseudonymous blockchain addresses to real-world risk categories.

Transaction Monitoring vs. Transaction Screening

Transaction monitoring and transaction screening are related but distinct compliance functions. Transaction monitoring analyzes patterns of customer behavior over time, looking for anomalies that suggest suspicious activity. Transaction screening checks individual transactions or counterparty details against watchlists—sanctions lists, PEP databases, adverse media—at the point of transaction. Most AML compliance programs require both: screening catches known bad actors at the counterparty level; monitoring catches previously unknown suspicious behavior through pattern analysis. For crypto businesses, this distinction maps directly to Chainalysis KYT (behavioral monitoring) and Chainalysis Wallet Screening (counterparty screening)—complementary capabilities that address different dimensions of the compliance obligation.

Crypto transaction monitoring: Know Your Transaction (KYT)

Know Your Transaction (KYT) is the crypto-native framework for transaction monitoring—designed specifically for the architecture of blockchain-based transactions, where traditional AML monitoring systems cannot operate. While conventional transaction monitoring analyzes account activity within a financial institution’s internal systems, KYT analyzes on-chain transaction data across public blockchain networks, attributing wallet addresses to real-world entities and scoring transaction risk based on counterparty exposure.

Chainalysis KYT is the industry-standard implementation of crypto transaction monitoring, used by exchanges, financial institutions, payment processors, and VASPs globally to meet AML obligations for cryptocurrency activity. 

How Crypto Transaction Monitoring Differs from Traditional Monitoring

Dimension Traditional AML Monitoring Crypto Transaction Monitoring (KYT)
Data Source Institution’s internal transaction records Public blockchain data ingested directly from nodes across 400+ networks
Counterparty ID Known account holders with verified KYC identity Pseudonymous wallet addresses attributed through clustering and entity analysis
Transaction Finality Reversible in many cases; chargebacks and recalls possible Irreversible once confirmed on-chain; no institutional recourse
Settlement Speed Hours to days (ACH, SWIFT) Seconds to minutes; real-time monitoring is operationally essential
Jurisdiction Single regulatory framework for each institution Multi-jurisdictional by default; borderless transactions require global rule coverage
Obfuscation Risk Shell companies, layered transfers Mixers, cross-chain bridges, privacy coins, DEX swaps
Screening Scope Entity-level watchlist matching Address-level screening against 400+ blockchain networks with attribution depth

What Does Crypto Transaction Monitoring Screen For?

Chainalysis KYT screens crypto transactions for exposure across multiple risk categories, assigning risk scores based on direct and indirect counterparty exposure:

  • Sanctioned addresses and entities — direct and indirect exposure to OFAC, EU, UN, and other sanctioned wallets and protocols
  • Darknet market wallets — addresses linked to darknet drug and illicit goods markets
  • Ransomware wallets — addresses used to collect extortion payments from ransomware operators
  • Crypto mixer exposure — transactions with direct or indirect links to known mixing services, including sanctioned mixers like Tornado Cash
  • Fraud and scam wallets — addresses linked to pig butchering operations, romance scams, and investment fraud schemes
  • High-risk exchange exposure — transactions originating from or destined for exchanges with inadequate AML controls
  • Terrorist financing — addresses linked to designated terrorist organizations or financing networks
  • Child sexual abuse material (CSAM) — wallets associated with known CSAM payment infrastructure

Each exposure category is assigned a risk score, and compliance teams configure KYT alert thresholds based on their institution’s risk appetite and regulatory environment. Alerts are generated for analyst review, with full transaction graph context and supporting evidence.

Continuous Monitoring and Retroactive Risk Updates

Crypto transaction monitoring is not a one-time check at the point of transaction. Chainalysis KYT supports continuous monitoring—retroactively updating risk assessments as new attribution data becomes available. When a wallet address is newly linked to a sanctions designation, a darknet market seizure, or an identified ransomware group, KYT can flag historical transactions involving that address across a compliance program’s full transaction history. This retroactive capability is operationally significant: it means that new intelligence about on-chain actors propagates backward through historical transaction data, enabling compliance teams to identify past exposures that were unknown at the time of transaction.

How is transaction monitoring used in blockchain investigations and compliance?

Crypto transaction monitoring connects the compliance function—detecting and reporting suspicious activity—to the investigative function: tracing funds, attributing actors, and supporting enforcement. This connection is where Chainalysis has a structural advantage over every traditional AML monitoring vendor. IBM, Napier, SEON, and Alloy can describe transaction monitoring theory; only Chainalysis can point to specific enforcement outcomes where its monitoring data directly contributed to criminal prosecution, asset seizure, or sanctions designation.

Detecting Money Laundering Through On-Chain Monitoring

Money laundering through cryptocurrency follows recognizable on-chain patterns: structuring transactions to stay below reporting thresholds, routing funds through multiple wallets to add distance from the illicit source, using DEXs and bridges to convert and obscure asset origins, and ultimately cashing out through exchanges with weak AML controls. KYT detects these patterns through behavioral analysis of transaction velocity, counterparty risk exposure, and movement patterns consistent with layering—the second stage of the money laundering cycle. Compliance teams receive alerts with the transaction graph context needed to assess whether detected patterns warrant SAR filing.

Sanctions Compliance and OFAC Screening

OFAC sanctions enforcement in the crypto context requires transaction-level screening against designated wallet addresses—not just entity names. When OFAC designates a wallet address, any transaction involving that address constitutes a potential sanctions violation, regardless of whether the institution knew the counterparty’s identity. KYT’s real-time screening against OFAC, EU, UN, and other global sanctions lists ensures that transactions with designated addresses are flagged before they complete, giving compliance teams the opportunity to block, hold, or investigate before settlement. Following the designation of Tornado Cash smart contract addresses in 2022, KYT’s ability to screen for indirect exposure through mixing activity became a critical compliance capability for any institution processing cryptocurrency transactions.

Supporting SAR Filing and Regulatory Reporting

Effective SAR filing requires more than detecting a suspicious transaction—it requires documenting the behavior observed, the investigation conducted, and the factual basis for the report in a format that financial intelligence units and law enforcement can act on. Chainalysis KYT provides the evidentiary layer that makes crypto SAR filing defensible: transaction graph visualizations, counterparty attribution data, and exposure category documentation that compliance officers can reference directly in SAR narratives. This documentation standard matters: the quality of SAR narratives directly affects whether law enforcement can use the report to advance an investigation.

Darknet Market and Ransomware Exposure Detection

Two of the highest-risk exposure categories in crypto transaction monitoring—darknet market proceeds and ransomware payments—require specialized attribution data that general-purpose AML tools cannot provide. Chainalysis maintains one of the most comprehensive darknet market and ransomware wallet attribution databases in the world, built through OSINT, law enforcement partnerships, and direct ecosystem research. KYT flags transactions involving these wallets in real time, enabling compliance teams to identify exposure to known criminal infrastructure at the point of transaction—before funds are commingled with clean assets in the institution’s accounts.

Cross-Chain and DeFi Monitoring

The most technically challenging dimension of crypto transaction monitoring is cross-chain activity: funds moving between blockchain networks through bridges, being swapped through DEX smart contracts, or being routed through DeFi protocols to obscure origins. Illicit actors exploit this complexity deliberately. Chainalysis KYT’s cross-chain monitoring capability follows funds across network boundaries, maintaining risk attribution through bridge transfers and DeFi interactions. For compliance teams at financial institutions and exchanges receiving funds with complex DeFi transaction histories, this capability is the difference between knowing and not knowing whether incoming funds carry sanctions or illicit exposure.

Risks and common misconceptions about transaction monitoring

“Transaction monitoring is just a checkbox compliance exercise.”

This is the most operationally dangerous misconception in AML compliance. Regulators do not examine whether a transaction monitoring program exists—they examine whether it works. Examinations assess rule calibration, alert investigation quality, SAR filing rates, and whether the program’s detection logic reflects the institution’s actual risk profile. Institutions that implement monitoring systems without ongoing tuning, alert investigation discipline, and continuous improvement processes regularly fail regulatory examinations and face enforcement action. The Westpac and Deutsche Bank cases below illustrate what checkbox compliance looks like in practice—and what it costs.

“Rules-based monitoring catches everything.”

Rule-based transaction monitoring catches what rules are written to catch. Static threshold rules designed for a 2018 customer population will systematically miss the typologies of 2026 financial crime—particularly in cryptocurrency, where illicit actors continuously adapt laundering techniques to exploit gaps in static rule sets. Modern transaction monitoring programs combine rule-based screening for known patterns with machine learning-based anomaly detection for novel ones. For crypto monitoring specifically, behavioral heuristics applied to on-chain graph data detect patterns that threshold rules cannot: mixer usage, layering through DEX swaps, and cross-chain structuring are all behavioral indicators that require graph analysis, not simple amount thresholds.

“Crypto transactions are anonymous and can’t be monitored.”

This misconception has been definitively refuted by a decade of successful enforcement. Public blockchains record every transaction permanently and transparently. Blockchain analytics platforms attribute wallet addresses to real-world entities through clustering algorithms, OSINT, and law enforcement partnerships—and those attributions are used in criminal prosecutions, civil asset forfeiture, and sanctions designations globally. Chainalysis data has contributed to the seizure of billions of dollars in illicit cryptocurrency and the attribution of major criminal operations including North Korea’s Lazarus Group, the Silk Road, and numerous ransomware syndicates. The pseudonymous nature of blockchain addresses raises the analytical complexity of monitoring—it does not make it impossible.

“KYC alone is sufficient for crypto compliance.”

Know Your Customer (KYC) verification establishes identity at onboarding. It tells you who a customer claims to be at the moment they open an account. It tells you nothing about what they do after onboarding—and financial crime rarely declares itself at the account opening stage. Transaction monitoring is the ongoing surveillance layer that complements KYC: it watches what customers actually do with their accounts after identity verification is complete. For crypto businesses, this distinction is operationally critical. A customer who passes KYC may subsequently receive funds from a ransomware wallet, route proceeds through a darknet market, or engage in structuring behavior. Only transaction monitoring detects these post-onboarding risk signals.

False Positive Overload

The most common operational failure in transaction monitoring programs is false positive overload: alert volumes so high that compliance analysts cannot investigate each alert meaningfully, resulting in systematic dismissal of alerts that may include genuine suspicious activity. Industry benchmarks suggest that well-calibrated programs achieve false positive rates below 5%—but many institutions operate with rates of 90% or higher, generating thousands of alerts per day that cannot be meaningfully reviewed. False positive overload is a regulatory risk as well as an operational one: examiners who find evidence of systematic alert clearing without meaningful investigation treat it as a program failure. Effective monitoring programs invest continuously in rule tuning, risk-based alert prioritization, and AI-assisted alert triage.

Incomplete Blockchain Coverage

Crypto transaction monitoring is only as effective as the blockchain networks it covers. Illicit actors route funds across less-monitored chains specifically to exploit coverage gaps. A monitoring program that screens Ethereum but not Tron, or monitors Layer 1 networks but not Layer 2s, creates systematic blind spots that sophisticated actors exploit. Comprehensive crypto transaction monitoring requires coverage across the full network topology where illicit actors operate—not just the highest-volume networks.

Real-world examples of transaction monitoring in action

The most instructive examples of transaction monitoring come in two categories: TradFi enforcement failures, where inadequate monitoring resulted in massive regulatory penalties; and crypto monitoring successes, where on-chain surveillance directly enabled enforcement outcomes. Both categories illuminate why transaction monitoring quality—not just presence—is the compliance standard regulators apply.

TradFi Enforcement Cases: The Cost of Inadequate Monitoring

Westpac Banking Corporation — Australia (2020)

AUD $1.3 Billion Penalty

AUSTRAC found that Westpac had failed to report over 23 million international fund transfers, including transactions linked to child exploitation in Southeast Asia. The bank’s transaction monitoring failed to detect structuring patterns and high-risk correspondent banking activity. At the time, it was the largest civil penalty in Australian corporate history—a direct consequence of monitoring program failures at scale.

Deutsche Bank — United States (2023)

$186 Million Fine

The Federal Reserve fined Deutsche Bank $186 million for persistent deficiencies in its AML transaction monitoring program, citing inadequate governance, insufficient resources for alert investigation, and failure to file SARs in a timely manner. The action was one of multiple regulatory penalties Deutsche Bank has faced for monitoring failures across jurisdictions, illustrating that recurring program deficiencies compound enforcement exposure.

Metro Bank — United Kingdom (2022)

60.5 Million Transactions Unmonitored

The FCA found that Metro Bank had failed to monitor over 60 million transactions worth £51 billion between 2016 and 2020 due to a system configuration error that excluded transactions from monitoring entirely. The failure went undetected for years, demonstrating the operational risk of insufficient program oversight and the importance of systematic monitoring of monitoring program integrity itself.

Crypto Transaction Monitoring Successes

OFAC Sanctions Enforcement via KYT

Real-Time Sanctions Screening at Scale

Following OFAC’s designation of Tornado Cash smart contract addresses in August 2022, exchanges and financial institutions using Chainalysis KYT were able to immediately screen for exposure to the designated addresses—both direct interactions and indirect exposure through the transaction graph. KYT’s real-time sanctions screening enabled compliance teams to identify and document exposure within hours of designation, providing the audit trail necessary to demonstrate proactive compliance.

Lazarus Group Cross-Chain Laundering Detection

Nation-State Actor Attribution

Chainalysis transaction monitoring data contributed directly to the attribution of North Korea’s Lazarus Group across multiple major DeFi exploits, including the Ronin Network hack ($625M) and the Harmony Horizon bridge exploit ($100M). On-chain behavioral analysis identified wallet clustering patterns and fund flow signatures consistent with previously identified Lazarus Group infrastructure, enabling OFAC to designate specific wallet addresses and law enforcement to build prosecution-quality evidence packages.

Pig Butchering Scam Network Detection

Fraud Typology Identification at Scale

Pig butchering—a sophisticated investment fraud scheme where victims are cultivated over months before being defrauded—has emerged as one of the highest-volume crypto fraud categories, generating billions in annual losses. Chainalysis KYT detection of pig butchering wallet clusters has enabled exchanges to block fund flows to known fraud infrastructure, flag incoming deposits for SAR investigation, and provide law enforcement with the network maps needed to identify and dismantle scam operations.

How Chainalysis helps organizations monitor crypto transactions

Transaction monitoring is the operational core of crypto compliance—and Chainalysis KYT is purpose-built to deliver it. Unlike traditional AML monitoring systems adapted to include a cryptocurrency module, Chainalysis built its monitoring infrastructure from the ground up for blockchain data: ingesting raw on-chain data at the node level, applying the industry’s most comprehensive attribution database, and delivering real-time risk intelligence across 400+ supported blockchain networks.

Chainalysis KYT (Know Your Transaction): Chainalysis KYT is the industry-standard crypto transaction monitoring solution for exchanges, financial institutions, VASPs, and payment processors. KYT ingests blockchain transaction data in real time, screens each transaction against Chainalysis’s global attribution database, assigns risk scores based on direct and indirect counterparty exposure, and generates compliance alerts for analyst review. KYT integrates into existing compliance workflows via API, enabling seamless incorporation into case management systems, SAR filing workflows, and risk decisioning infrastructure. For institutions subject to FinCEN, FATF, FCA, MiCA, or other AML frameworks, KYT provides the crypto-specific transaction monitoring capability that general-purpose AML systems cannot replicate.

Chainalysis Reactor: Reactor is the investigation platform that extends KYT’s monitoring capability into full forensic analysis. When a KYT alert warrants deeper investigation—a high-risk counterparty, an unusual fund flow pattern, or potential sanctions exposure—Reactor allows investigators to follow the full transaction graph: tracing funds through mixers, bridges, DEX swaps, and DeFi protocol interactions across multiple blockchain networks. Reactor produces the evidence-quality outputs that support SAR narratives, law enforcement referrals, and regulatory examinations. For compliance teams that need to move from a KYT alert to a defensible case file, Reactor is the operational bridge.

Chainalysis Data Solutions (DS): Chainalysis DS provides direct API access to the attribution database, risk signals, and on-chain data that power KYT—enabling institutions to embed Chainalysis intelligence into their own compliance platforms, risk models, and transaction decisioning infrastructure. For financial institutions building proprietary AML systems or technology vendors developing crypto compliance products, Data Solutions provides the foundational intelligence layer that makes effective transaction monitoring possible.

Frequently asked questions about transaction monitoring

Q: What is transaction monitoring in AML?

A: Transaction monitoring in AML is the process of analyzing customer financial transactions in real time or near-real time to detect patterns or behaviors that may indicate money laundering, terrorist financing, sanctions violations, or other financial crime. Regulated financial institutions are legally required to maintain transaction monitoring programs under the Bank Secrecy Act (BSA), FATF Recommendations, and equivalent regulations globally—and to file suspicious activity reports (SARs) when monitoring identifies reportable activity.

Q: Why is transaction monitoring important?

A: Transaction monitoring is the primary operational mechanism by which financial institutions and crypto businesses detect financial crime after customer onboarding. KYC establishes identity; transaction monitoring watches what customers actually do. Without effective monitoring, institutions cannot detect structuring, layering, sanctions evasion, or other post-onboarding illicit behaviors—exposing them to regulatory penalties, enforcement action, and the reputational damage of being used as a money laundering conduit. The billions of dollars in regulatory fines levied against institutions with inadequate monitoring programs illustrate what the compliance failure costs.

Q: How does crypto transaction monitoring work?

A: Crypto transaction monitoring works by ingesting blockchain transaction data directly from node-level sources, attributing wallet addresses to real-world entities using clustering algorithms and an attribution database, scoring each transaction’s risk based on direct and indirect counterparty exposure to known risk categories (sanctioned addresses, darknet markets, ransomware wallets, mixers), and generating compliance alerts for analyst review. Solutions like Chainalysis KYT provide real-time monitoring across 400+ blockchain networks, integrating into existing compliance workflows via API to enable alert investigation, SAR filing, and regulatory reporting.

Q: What is the difference between KYC and KYT?

A: KYC (Know Your Customer) is the identity verification process conducted at onboarding—establishing who a customer is before they can access a financial institution’s services. KYT (Know Your Transaction) is the ongoing transaction monitoring process that watches what customers do after onboarding—screening blockchain transactions for risk exposure and suspicious behavior. KYC is a point-in-time check; KYT is continuous. Both are required components of a complete crypto AML compliance program, and neither substitutes for the other.

Q: What are transaction monitoring red flags?

A: Common transaction monitoring red flags include: unusual transaction amounts inconsistent with a customer’s stated business or financial profile; structuring (multiple transactions just below reporting thresholds); high-velocity transactions with no apparent business purpose; transactions involving high-risk geographies or sanctioned jurisdictions; counterparty exposure to known illicit infrastructure (darknet markets, ransomware wallets, mixers); and sudden changes in transaction patterns after a period of normal activity. For crypto-specific monitoring, additional red flags include interaction with sanctioned smart contract addresses, mixer exposure, and cross-chain movement patterns consistent with layering.

Transaction monitoring is the foundation of crypto compliance.

Chainalysis KYT gives exchanges, financial institutions, and VASPs the real-time visibility they need to detect, investigate, and report suspicious crypto activity across 400+ blockchain networks.

Request a Demo and see how Chainalysis KYT can power your transaction monitoring program.

Explore Chainalysis KYT for crypto transaction monitoring 

Read the 2026 Crypto Crime Report