Spaces:
Sleeping
Sleeping
| import requests | |
| import json | |
| # Replace this with your actual LogReg API endpoint | |
| API_URL = "https://point9-ml-tfidf-logreg-project.hf.space/predict" | |
| sample_payload = { | |
| "transaction_data": { | |
| "Transaction_Id": "TXN12345", | |
| "Hit_Seq": 1, | |
| "Hit_Id_List": "HIT789", | |
| "Origin": "India", | |
| "Designation": "Manager", | |
| "Keywords": "fraud", | |
| "Name": "John Doe", | |
| "SWIFT_Tag": "TAG001", | |
| "Currency": "INR", | |
| "Entity": "ABC Ltd", | |
| "Message": "Payment for services", | |
| "City": "Hyderabad", | |
| "Country": "India", | |
| "State": "Telangana", | |
| "Hit_Type": "Individual", | |
| "Record_Matching_String": "John Doe", | |
| "WatchList_Match_String": "Doe, John", | |
| "Payment_Sender_Name": "John Doe", | |
| "Payment_Reciever_Name": "Jane Smith", | |
| "Swift_Message_Type": "MT103", | |
| "Text_Sanction_Data": "Suspicious transfer to offshore account", | |
| "Matched_Sanctioned_Entity": "John Doe", | |
| "Is_Match": 1, | |
| "Red_Flag_Reason": "High value transaction", | |
| "Risk_Level": "High", | |
| "Risk_Score": 87.5, | |
| "Risk_Score_Description": "Very High", | |
| "CDD_Level": "Enhanced", | |
| "PEP_Status": "Yes", | |
| "Value_Date": "2023-01-01", | |
| "Last_Review_Date": "2023-06-01", | |
| "Next_Review_Date": "2024-06-01", | |
| "Sanction_Description": "OFAC List", | |
| "Checker_Notes": "Urgent check required", | |
| "Sanction_Context": "Payment matched with OFAC entry", | |
| "Maker_Action": "Escalate", | |
| "Customer_ID": 1001, | |
| "Customer_Type": "Corporate", | |
| "Industry": "Finance", | |
| "Transaction_Date_Time": "2023-12-15T10:00:00", | |
| "Transaction_Type": "Credit", | |
| "Transaction_Channel": "Online", | |
| "Originating_Bank": "ABC Bank", | |
| "Beneficiary_Bank": "XYZ Bank", | |
| "Geographic_Origin": "India", | |
| "Geographic_Destination": "USA", | |
| "Match_Score": 96.2, | |
| "Match_Type": "Exact", | |
| "Sanctions_List_Version": "2023-V5", | |
| "Screening_Date_Time": "2023-12-15T09:55:00", | |
| "Risk_Category": "Sanctions", | |
| "Risk_Drivers": "PEP, High Value", | |
| "Alert_Status": "Open", | |
| "Investigation_Outcome": "Pending", | |
| "Case_Owner_Analyst": "analyst1", | |
| "Escalation_Level": "L2", | |
| "Escalation_Date": "2023-12-16", | |
| "Regulatory_Reporting_Flags": True, | |
| "Audit_Trail_Timestamp": "2023-12-15T10:05:00", | |
| "Source_Of_Funds": "Corporate Account", | |
| "Purpose_Of_Transaction": "Service Payment", | |
| "Beneficial_Owner": "John Doe", | |
| "Sanctions_Exposure_History": False | |
| } | |
| } | |
| headers = {"Content-Type": "application/json"} | |
| response = requests.post(API_URL, headers=headers, data=json.dumps(sample_payload)) | |
| print("Status Code:", response.status_code) | |
| try: | |
| print("Response:", json.dumps(response.json(), indent=2)) | |
| except Exception as e: | |
| print("Error parsing response:", e) | |
| print("Raw Response:", response.text) | |