Sr# | Case / Exchange Name | Country | AML Network Risk Rating |
---|---|---|---|
1 | Hacked Coinbase Wallets | India, United States | 🔴 High Risk |
2 | Dogecoin | China, Israel, Turkey | 🔴 High Risk |
3 | XRP Crypto | United States | 🔴 High Risk |
4 | Ethereum Crypto | Australia, China | 🔴 High Risk |
5 | Dash Cryptocurrency | United Kingdom, United States, Venezuela | 🔴 High Risk |
6 | Zcash | France, Italy, Japan, Nigeria, Poland, Spain, United Kingdom, United States, Zimbabwe | 🔴 High Risk |
7 | Binance Coin (BNB) | Canada, France, Iran, Japan, Korea, North (North Korea), Syria, United Kingdom, United States | 🔴 High Risk |
8 | SafeMoon | United States | 🔴 High Risk |
9 | CREAM Finance Exploit 2021 | Poland, United States | 🔴 High Risk |
10 | Liberty Reserve | Costa Rica, Malaysia, Nigeria, Russia, Spain, United States, Vietnam | 🔴 High Risk |
11 | Bitfinex Hack BTC | Kazakhstan, Russia, Ukraine, United States | 🔴 High Risk |
12 | Roger Nils-Jonas Karlsson Crypto Fraud | Sweden, Thailand, United States | 🔴 High Risk |
13 | Chainalysis Flagged Cryptocurrency Addresses | Canada, Chile, Germany, India, Iran, Israel, Japan, Lithuania, Norway, Russia, United Arab Emirates, United States | 🔴 High Risk |
14 | Cashaa Token | India, United Kingdom | 🔴 High Risk |
15 | BitConnect Ponzi scheme | India, United States | 🔴 High Risk |
16 | BitClub Network Ponzi Scheme | Germany, Romania, United States | 🔴 High Risk |
17 | Wall Street Market Darknet Seizure | Germany, United States | 🔴 High Risk |
18 | BitMEX | United States | 🔴 High Risk |
19 | Mt. Gox Collapse | Japan, United States | 🔴 High Risk |
20 | Helix Bitcoin Mixer | United States | 🔴 High Risk |
21 | BTC-e Exchange | Russia, United States | 🔴 High Risk |
22 | OneCoin Fraud Scheme | Australia, Belize, Bulgaria, China, Germany, United Arab Emirates, United Kingdom, United States | 🔴 High Risk |
23 | OKX Crypto Exchange | Seychelles, United States | 🔴 High Risk |
24 | Bitcoin Fog Cryptocurrency Mixer | Romania, Russia, Sweden, United States | 🔴 High Risk |
25 | Tornado Cash | Korea, North (North Korea), United States | 🔴 High Risk |
26 | Silk Road Darknet Market Place | United States | 🔴 High Risk |
27 | PlusToken Ponzi Scheme | China | 🔴 High Risk |
28 | Thodex Crypto Scam | Albania, Turkey | 🔴 High Risk |
29 | Bitfinex Hack Money Laund | United States | 🔴 High Risk |
30 | Cross-Border Crypto | Saudi Arabia, United Arab Emirates | 🔴 High Risk |
31 | Egyptian Darknet | Egypt | 🔴 High Risk |
32 | Bahrain Blockchain Scam | Bahrain, Lebanon | 🔴 High Risk |
33 | Dubai Crypto Exchange | Czech Republic (Czechia), India, United Arab Emirates, United Kingdom, United States | 🔴 High Risk |
34 | DragonForce Ransomware | Saudi Arabia | 🔴 High Risk |
Cryptocurrency, once hailed as a disruptive financial innovation, has rapidly evolved into a double-edged sword. While it provides secure, decentralized, and efficient transaction channels, it has also become a haven for criminals, kleptocrats, and cybercriminal syndicates seeking to obscure the origin of illicit funds.
Traditional money laundering required a complex network of shell companies, banks, and corrupt intermediaries. With cryptocurrencies, illicit actors can move millions across borders in minutes—sometimes anonymously, and often without triggering compliance checks. Tools like mixers (e.g., Tornado Cash), privacy coins (e.g., Monero, Zcash), and decentralized exchanges have made tracing the source of funds exponentially more difficult.
At Anti Money Laundering Watch (AML Watch), we recognize that cryptocurrency laundering represents one of the fastest-growing and most elusive threats in the global financial system. That’s why our Cryptocurrency Laundering Database documents high-risk wallets, laundering typologies, confirmed and suspected laundering incidents, and entities enabling or facilitating these flows. This resource is vital for regulators, journalists, banks, crypto firms, and investigators worldwide.
Cryptocurrency laundering takes many forms, often combining traditional laundering techniques with new, tech-driven methods. Here’s how criminal organizations adapt:
These services blend illicit crypto with clean coins, obscuring the transaction trail. While some claim to offer privacy, many have become essential tools for laundering proceeds from darknet markets, ransomware attacks, and state-sponsored theft.
Unlike Bitcoin and Ethereum, privacy-focused cryptocurrencies like Monero offer untraceable transactions. These are favored by organized crime and hacker groups for large-scale laundering.
By converting crypto from one asset to another (e.g., Bitcoin to Ethereum to Monero), criminals break the transactional chain, making forensic analysis nearly impossible without advanced tools.
Decentralized platforms allow pseudonymous users to access complex financial services without KYC requirements. Launderers use DeFi to deposit and withdraw illicit funds via lending, staking, or liquidity pools—blending dirty assets with legitimate flows.
Non-fungible tokens (NFTs) are now being used for wash trading—artificially inflating asset values and disguising transactions. Because NFTs can be transferred easily between anonymous wallets, they’re ideal for disguising bribe payments or criminal profits.
Our database not only records such typologies but also links them to real cases, actors, and transactional histories.
The Cryptocurrency Laundering Database includes data-rich profiles of confirmed and suspected laundering networks. Each profile documents wallet addresses, linked exchanges, transaction chains, and associated individuals or corporate fronts. Here are some illustrative examples:
Each entry includes risk scoring, jurisdictional exposure, and potential red flags—making our database a practical tool for due diligence and investigative research.
Our team has developed a structured list of red flags based on FATF guidance, forensic blockchain analysis, and case investigations. Key red flags include:
We incorporate these red flags into our risk scoring methodology, allowing users of the database to quickly assess the severity of each case.
The Cryptocurrency Laundering Database is used by:
Each case in our database follows a rigorous multi-source verification process:
All entries are referenced with credible sources including law enforcement, regulatory reports, blockchain explorers, and investigative journalism.
Unchecked crypto laundering enables massive criminal operations and undermines trust in the blockchain economy. When launderers succeed in moving billions undetected, they fund terrorism, prolong wars, enable kleptocracy, and destabilize entire economies.
Publicly documenting and exposing these cases is not just an act of transparency—it is a deterrent. It pressures exchanges to tighten controls, regulators to harmonize standards, and criminals to lose their safe havens.
At AML Network, we believe that exposing laundering networks in the crypto sphere is essential for safeguarding democratic institutions, financial systems, and civil society.
Our research highlights specific jurisdictions where crypto laundering thrives due to weak enforcement or intentional regulatory arbitrage. Key concerns include:
We also flag jurisdictions with weak implementation of FATF’s Travel Rule and KYC protocols for VASPs (Virtual Asset Service Providers).
The future of finance depends on clean systems. If crypto is to be a force for good, it must be protected from misuse. Join us in the fight to expose, document, and shut down the pipelines of digital laundering.
Whether you’re a regulator, journalist, compliance officer, or academic, the Cryptocurrency Laundering Database on Anti Money Laundering Network is your essential tool to stay informed, investigate confidently, and act decisively.