Uniswap has blocked 253 crypto addresses related to stolen funds or sanctions

Quick Take

  • Uniswap has blocked 253 crypto addresses, according to data briefly shown on GitHub.
  • It was the first time Uniswap has shared details on this, along with further information on its methodology.
 

Decentralized exchange Uniswap has blocked 253 crypto addresses in its four months of working with blockchain analytics firm TRM Labs.

It was the first time Uniswap had revealed data on wallet blacklisting. 

The addresses were mostly blocked because of connections with stolen funds or transaction mixing services like Tornado Cash, which was recently sanctioned by the US Treasury. 

The data was published on GitHub by Uniswap software engineer Jordan Frankfurt, according to Yearn Finance core developer Banteg, who saved the data in a tweet thread and on GitHub. We reached out to Frankfurt and Uniswap for comment and will update this article should we hear back. 

There are three core things that make up Uniswap: code running on the blockchain that anyone can interact with, a front-end website that provides one way for users to interact with the code and a US-based company that develops the protocol and runs the front-end website. Blocking crypto addresses happens on the front-end level. 

Uniswap partnered with TRM Labs in April. When someone interacts with the Uniswap website, their address is sent to TRM Labs, which will assign it a risk level. It’s up to Uniswap to decide what risk levels it’s comfortable with. 

According to Frankfurt’s comments on GitHub, Uniswap initially blocked addresses that were indirectly related to sanctioned addresses, but has since scaled that back. Now it only blocks addresses that were sanctioned or have directly received hacked or stolen funds. 

TRM Labs checks the addresses for seven categories of illegal activity, according to a chart shared on GitHub. The main four that are commonly flagged are stolen funds, funds from a transaction mixer, sanctioned addresses and funds from a known scam. The remaining categories are child sexual abuse material, funds from known hacker groups and funds used for terrorist financing.  

Banteg noted that 30 of the addresses were associated with ENS names, which are human readable names used to make it easier to send crypto payments to those wallets. Banteg reckoned most of them were probably legitimate users.


© 2022 The Block Crypto, Inc. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

About Author

Tim is a News Editor at The Block who focuses on DeFi, NFTs and DAOs. Prior to joining The Block, Tim was a News Editor at Decrypt. He has earned a BA in Philosophy from the University of York and studied News Journalism at the Press Association. Follow him on Twitter @Timccopeland.