285 TRX
82.5075 USDT
300 TRX
86.91 USDT
220 TRX
63.8 USDT
7.372112 LTC
735.5436 USDC
377.1289 USDT
30999.9956 RUB
960000 RUB
11573.2369 USDT
3190 USDT
263809.491 RUB
250 USDT
20422.5 RUB
407385 RUB
4950 USDT
802 USDT
65956.48 RUB
400000 RUB
4833.8369 USDT
1000000 RUB
12090.6344 USDT
1000000 RUB
12070.006 USDT
850 USDT
69181.5 RUB
435000 RUB
5298.4166 USDT

AML KYC Rules

AML / KYC / KYT Verification Policy

1. This AML Policy is designed to identify transactions related to terrorism financing, money laundering, and other illegal activities.

2. The AML Policy aims to prevent and mitigate potential risks of the Operator being involved in any unlawful activity.

3. The Operator (hereinafter also referred to as the Executor) conducts Customer identification (hereinafter also referred to as the Client, User) whenever there are reasonable suspicions of website misuse or illegal activities that may involve money laundering or attempted laundering of unlawfully obtained funds.

4. All users acknowledge and agree to the following conditions:

  • Compliance with applicable anti-money laundering legislation.
  • The Operator applies KYC (Know Your Customer) and KYT (Know Your Transaction) procedures in line with this AML Policy.
  • The User undertakes to cooperate with the Operator by providing accurate information and documents related to their activity, accounts, and transaction purposes.
  • The Operator may use Client information for investigations and/or to prevent unlawful activities.

5. To prevent illegal operations, the Operator sets the following requirements:

  • The User’s personal data must be valid and up to date.
  • Requests through anonymous proxies or anonymous internet connections are prohibited.

6. Within the KYC procedure, the User must provide valid documents (e.g., national passport, international passport, bank statement). The Operator reserves the right to collect such information.

7. The Operator may conduct enhanced due diligence on Users engaged in suspicious activity and re-request documents even after AML/KYC/KYT verification has been completed.

8. Client identification data will be collected, stored, transferred, and protected in line with the Operator’s Personal Data Processing Policy.

9. After identity verification, the Operator disclaims legal responsibility for potential unlawful use of its services.

10. An AML Compliance Officer, appointed by the Operator, is responsible for:

  • Collecting User identification data.
  • Developing and updating internal policies.
  • Monitoring transactions and investigating unusual activity.
  • Maintaining a record-keeping systеm.
  • Updating risk assessments regularly.
  • Providing information to law enforcement as required.

11. The AML Officer may cooperate with law enforcement in anti-money laundering and counter-terrorism matters.

12. Within the verification process, the Operator may:

  • Request identity, residence, and financial documents.
  • Block accounts and transactions if verification is not passed.
  • Share data with authorities as required by law.
  • Refuse withdrawals to third-party accounts.
  • Withhold funds until investigations conclude.
  • Refuse services if there are reasonable suspicions about asset origin.
  • Refund funds minus network fees.

13. The Operator reserves the right to monitor the entire transaction chain to detect suspicious activity.

14. The Operator is not required to disclose its verification methods or results.

15. Transaction Monitoring:

  • 15.1. Data analysis is used as a risk assessment tool.
  • 15.2. The GetBlock service is applied to detect suspicious transactions.
  • 15.3. AML risk score above 69% → transaction frozen.
  • 15.4. AML risk score above 79% → transaction frozen.
  • 15.5. Transactions from sanctioned services → blocked regardless of score.
  • 15.6. Victim-report tag (criminal case link) → blocking.
  • 15.7. Assets tagged as “sanctions” or “mixer” may be indefinitely frozen by regulators; refunds are not guaranteed.

16. Each investigation is conducted individually, taking into account factors like transaction date, structure, and fund ratios.

17. During monitoring, the Operator may:

  • Suspend a transaction.
  • Request a selfie with an ID document.
  • Request a withdrawal wallet screenshot.
  • Block accounts/transactions and inform authorities.
  • Withhold funds until investigations conclude.
  • Return assets only to the original source account (or after verification).
  • Request additional documents.
  • Return funds minus network fees.

18. If the User fails to provide requested information and remains unresponsive for over 6 months, withheld funds will not be refunded.

Privacy Policy

Purpose of this Document

This Privacy Policy explains what data we collect when you visit our website, register, and/or use our services. It also describes how we process and protect your information.

Consent to Data Processing

By accessing our website (whether registered or not), you confirm that:

  • You voluntarily provide us with your personal data;
  • You agree with the terms of this Policy;
  • You allow us to collect information about you when visiting the site, registering, and using services;
  • You accept the possibility of future amendments to the Policy;
  • You do not object to being contacted by our employees, affiliates, and partners (unless you opt out).

What Data We Collect

By using the site, you consent to the use of cookies, which store certain information (e.g., IP address, location).

We may also request:

  • Identification data — full name, address, passport details, state-issued IDs;
  • Contact data — phone, email, account details, residential address;
  • Additional information — required for security, platform improvement, or legal compliance.

When visiting third-party resources, please review their privacy policies. We are not responsible for their actions.

Data Processing under GDPR

If your data is located in the EEA, under GDPR you have the right to:

  • Access information about how your data is processed (copies may be refused in some cases);
  • Correct inaccurate/incomplete data (proof of identity may be required);
  • Request deletion of personal data (unless legally required to retain it);
  • Restrict processing or object to use of data;
  • Withdraw consent to processing (processing may continue on legal grounds).

A Data Protection Officer (DPO) is appointed to safeguard your personal data.

How We Obtain Your Data

  • Data you provide directly;
  • Data from third parties (e.g., payment systems);
  • Data collected during use of the website/services;
  • Data from public sources.

Cookies

We use cookies and analytics tools (e.g., Google Analytics) to collect usage data. Cookies are small files stored on your device. They may be disabled in your browser, but functionality could be limited.

Purposes of Data Processing

  • Providing services and processing requests;
  • Identity verification;
  • Platform improvement;
  • Statistical analysis;
  • Personalizing user experience;
  • Account security (e.g., 2FA);
  • Fraud prevention;
  • Legal compliance.

We do not sell data to third parties. Disclosure may occur only to:

  • Affiliates assisting in service delivery;
  • Government authorities as required by law.

To prevent fraud, we may use third-party verification tools.

How We Protect Your Data

  • Physical protection — secure storage in data centers;
  • Electronic protection — restricted access systems;
  • Administrative control — authorized staff only;
  • Technical safeguards — encryption and security tech;
  • Additional measures — monitoring and server protection.

Despite measures, data transfer over the Internet involves risks. We are not liable for breaches caused by cyberattacks or unauthorized actions.

Data Retention Period

Data is stored as long as needed for obligations and legal requirements. Afterward, it is deleted or anonymized.

We consider:

  • Volume and sensitivity of data;
  • Risk of unauthorized use;
  • Processing purposes;
  • Legal obligations.

Data Transfers Outside the EEA

If you are in the EEA, transfer outside this zone requires your consent. Without it, you cannot use services, but you may withdraw funds.

Conclusion

We take all possible measures to protect your data. If you have questions regarding this Policy, please contact us.

© All rights reserved

Choose file
Give
Get
Exchange
days
hours
Operator offline
15.11.2025, 04:40