Expose the Money Mule Networks Rings

A graph-based forensics engine that uncovers illicit fund flows through multi-hop account networks — detecting cycles, smurfing, and layered shells that traditional systems miss entirely.

DETECTION PATTERNS

Three Ways Mules
Move Dirty Money

A → B → C → A
ALGORITHM
Johnson's Cycle Detection · Depth 3–5
Cycle Detection
Circular Fund Routing
Money loops through multiple accounts and returns near its origin, severing the traceable trail. Classic layering used by organized mule rings.
ORIGIN → → DEST
ALGORITHM
BFS Chain Traversal · ≤3 txn/node
Shell Networks
Layered Shell Accounts
Funds pass through ghost intermediary accounts with minimal transaction history, adding complexity to obscure the true destination.
10+ → HUB → 10+ | 72hr window
ALGORITHM
In/Out-Degree Analysis · Temporal BFS
Smurfing
Fan-In / Fan-Out
Dozens of small deposits aggregate into one hub account, then instantly disperse — deliberately staying below reporting thresholds.
PIPELINE

Follow The Money
In 5 Steps

CSV Ingestion

Upload your transactions. PapaParse streams rows and validates all 5 required columns instantly.

Graph Build

Network constructs a directed weighted graph — accounts as nodes, transactions as edges.

Algorithm Suite

Cycle detection, degree analysis, BFS traversal and temporal windowing run in parallel.tly.

Suspicion Score

Each account receives a 0–100 weighted risk score based on pattern hits and velocity.

Visualize & Export

Interactive graph renders flagged rings. Download the full forensics JSON report.

SCORE ENGINE

See How Suspicion
Score Works

Toggle each detected pattern to see how it contributes to the final risk score in real time.

Cycle Detected (length 3)
+40 points
Fan-Out Hub (12 receivers)
+25 points
High Velocity (72hr window)
+20 points
Shell Chain (3 hops)
+30 points
Multi-Pattern Overlap Bonus
+10 points
LIVE SUSPICION SCORE
65MEDIUM RISK
ACC_00347 · RING_001
cycle_length_3fan_out
SCORE BREAKDOWN
Cycle Weight40
Smurfing Weight25
Velocity Weight0
Shell Weight0
REQUIRED OUTPUTS

Forensic-Grade
Results

Interactive Graph Visualization
Click nodes to inspect · Filter by ring · Zoom & pan
All sender & receiver accounts as directed nodes
Fraud rings highlighted in distinct colors
Hover tooltip with full account metadata & score
Suspicious nodes visually distinct (larger, red border)
Downloadable JSON Report
Exact format matching required for evaluation
{
"suspicious_accounts": [
{
"account_id": "ACC_00123",
"suspicion_score": 87.5,
"detected_patterns": ["cycle_length_3", "high_velocity"],
"ring_id": "RING_001"
}
],
"fraud_rings": [...],
"summary": {
"total_accounts_analyzed": 500,
"suspicious_accounts_flagged": 15,
"fraud_rings_detected": 4,
"processing_time_seconds": 2.3
}
}
Fraud Ring Summary Table
Every detected ring with full member details
PATTERN TYPEMEMBERSRISK SCOREMEMBER ACCOUNTS
Cycle + Smurfing595.3ACC_001, ACC_002, ACC_003, ACC_004, ACC_005
Shell Network472.1ACC_010, ACC_011, ACC_012, ACC_013
Fan-Out (Smurfing)1261.4ACC_020, ACC_021, ... +10 more
GET STARTED

Drop Your CSV.
Expose The Ring.

Upload your transaction data and get full forensic results in under 30 seconds.

Drag & drop your CSV file
or click to browse · Max size 5MB
transaction_idsender_idreceiver_idamounttimestamp