Welcome to the Harpie docs!
  • About
    • Whitepaper
    • What attacks can Harpie prevent?
  • Tech & Security
    • Harpie's Anti-Theft Tech
    • About the Transaction Firewall
    • About the Harpie Vault
    • Security
    • Contracts
      • Deployments
      • Transferer
      • Noncustodial Vault
      • Audit
    • Disclosures & Risks
  • Help
    • Getting Started
      • Get Protected
        • Protecting a token or NFT
        • Setting a withdrawal address
    • My NFTs are stuck in the Harpie Vault, how do I recover them?
    • My Vault is saying I only have 1 NFT recovered, but there should be more
    • FAQ
      • Is Harpie audited?
      • What is Harpie?
      • What is a Trusted Network?
      • What happens when I "Protect" something?
      • What is a Withdrawal Address?
  • Harpie For Enterprise
    • Harpie For Enterprise
      • Background Check API
      • Methods
        • Validate Address
        • Validate Transaction
        • Get Contract Name
Powered by GitBook
On this page
  • Introduction
  • How it works
  • Getting Started
  • Main Methods
  • Other Methods
  1. Harpie For Enterprise
  2. Harpie For Enterprise

Background Check API

PreviousHarpie For EnterpriseNextMethods

Last updated 1 year ago

Introduction

Harpie's Background Check API screens any Ethereum address, letting you know if it's been involved in hacking, phishing, and other cybercrime. Our results are human-readable and actionable, giving you and your users peace-of-mind while using the blockchain.

Additionally, our background checks let you know if a contract is associated with a protocol: we have a database of over 800,000 smart contracts, along with their deployer and contract name (ex. Curvefi: 3pool).

How it works

We've developed a big-data engine with help from some of Ethereum's most famous data engineers. Using on-chain data, police reports, and other data, we've indexed over 1.8 million malicious addresses and 800,000 verified smart contracts.

Getting Started

Test Key: 74778fa4-88a8-4e35-922a-02bd82005edd

Main Methods

Other Methods

To find your API key, log in to to your dashboard at . You can try out some of our API methods using a rate limited API key (10 requests/minute):

https://harpie.io/rpc/enterprise/login

Validate Address

Get a background check on any address: see if it's involved in theft or associated with a protocol.

Validate Transaction

See if a transaction will end up sending assets to a malicious address.

Get Contract Name

Look up a contract's name.

An example background check