Decrypto: Real-Time Crypto AML Intelligence

Inspiration

Financial systems rely on trust. Decentralised systems remove intermediaries, but they do not remove the need to understand risk.

Blockchain makes every transaction visible. It also fragments that information across wallets, intermediaries, and time. Illicit flows exploit this structure by appearing as ordinary activity distributed across many addresses.

  • $158B estimated illicit volume
  • $93B linked to sanctioned infrastructure
  • ~1.2% of total flow, dispersed across networks

The constraint is not visibility. It is reconstruction.

If decentralised finance is to scale safely, risk must be interpretable in real time.


What It Does

Decrypto converts a wallet address into an investigation.

  • probabilistic risk score
  • behavioural explanation
  • ranked fund flows
  • interactive graph
  • exportable report

The system does not show the network. It extracts the part of the network that matters.


Core System

Decrypto aligns three layers:

  1. behavioural inference
  2. network reconstruction
  3. decision-focused visualisation

Each layer feeds the next.


Pipeline

01 — Feature Construction

A wallet is encoded as a behavioural vector:

$$ X = {x_1, x_2, ..., x_n} $$

capturing:

  • transaction velocity and volume
  • inflow vs outflow asymmetry
  • counterparty exposure
  • interaction with flagged entities
  • temporal structure

Unknown wallets trigger real-time feature construction. Known wallets retrieve stored representations.


02 — AI Risk Engine

A Random Forest model estimates:

$$ P(\text{illicit} \mid X) $$

Outputs:

  • risk score (0–100)
  • classification
  • feature-level attribution

The model detects behavioural anomalies that are not observable at the transaction level.

This output feeds directly into graph scoring.


03 — Graph Construction Under Constraint

The backend exposes only one-hop relationships with directional flow:

  • value sent
  • value received

There is no explicit multi-hop topology.

Decrypto reconstructs investigation structure from this incomplete view.


04 — Path Extraction and Scoring

The system derives candidate paths and ranks them:

$$ \text{PathScore} = 1.1 \cdot w(r_1) + 1.25 \cdot w(r_2) + \text{destinationBoost} + \text{routingBoost} + \text{centerBoost} + \text{nodeRiskScore} + \log_{10}(V + 1) $$

Where:

  • ( w(r) ) maps categorical risk into weights
  • ( V ) captures transaction magnitude
  • boost terms prioritise:
    • sanctioned endpoints
    • structurally important intermediaries
    • proximity to the investigated wallet

This combines:

  • model-derived risk
  • inferred network structure
  • capital flow

One dominant path is selected.


05 — Graph Rendering

The graph is rendered as a constrained flow:

  • source
  • routing layer
  • destination

Low-signal nodes are suppressed.
High-signal paths are isolated.

Interaction model:

  • hover isolates a path
  • click reveals node-level detail
  • background structure fades

The graph behaves as a decision engine.


06 — Investigation Interface

The system presents:

  • dominant flow
  • risk summary
  • exposure metrics
  • sanctions matches

with supporting tabs:

  • transactions
  • counterparties
  • activity
  • alerts

Controls are minimal to preserve focus.


07 — Output

The result is a structured investigation:

  • risk classification
  • flagged paths
  • quantified exposure
  • exportable report

Technical Depth

The backend does not provide a full transaction graph.

Decrypto reconstructs ranked investigation paths from:

  • partial topology
  • directional flow data
  • probabilistic risk signals

and aligns them into a single coherent interface.

This requires:

  • inferring structure where none is explicit
  • combining ML outputs with graph reasoning
  • suppressing combinatorial explosion in paths
  • preserving interpretability under constraint

Impact

Decrypto enables:

  • AML and compliance workflows
  • rapid investigation of suspicious wallets
  • risk monitoring in digital asset systems

As capital becomes borderless, trust shifts into infrastructure.

Systems that make financial flows interpretable enable safe participation at scale.


Growth

  • multi-hop reconstruction and clustering
  • graph-based learning for coordinated behaviour detection
  • cross-chain tracing
  • real-time alerting
  • institutional integration

One Line

Crypto transactions are complex and hard to interpret. Decrypto detects money laundering in real time using graph analytics and machine learning, turning activity into clear, actionable risk insights for faster, smarter decisions.

Built With

Share this project:

Updates