Device Intelligence
Analyzes a customer’s device for signs of tampering or suspicious activity to assess fraud risk.
About service
The Device Intelligence check examines a customer’s device and its network connection to detect fraud signals.
This service supports a range of device types, including:
Mobile phones
Tablets
Laptops and desktop PCs
Kiosks and POS terminals
This service helps ensure that only trusted and genuine devices are used during customer onboarding.
Analysis performed
The check performs a wide range of device and network risk assessments.
Detailed verification checks
Device Analysis
Previously enrolled device: Flags devices reused across multiple customer accounts.
Emulator detection: Flags attempts to use virtualized or emulated devices.
Rooted/Jailbroken device: Detects compromised operating systems with escalated privileges.
Cloned app: Identifies duplicate or cloned versions of applications.
Browser tampering: Detects altered or suspicious browser setups.
Virtual machine: Flags devices running inside virtual environments.
Location spoofing: Detects falsified or masked geolocation signals.
Frida detection: Detects mobile debugging and manipulation frameworks.
Network Analysis
VPN detection: Identifies usage of Virtual Private Networks.
Relay detection: Detects relay service providers.
Bot Analysis
Bot detection: Detects whether sessions are automated or bot-driven.
Timeline Analysis
Device timeline analysis: Monitors device behavior patterns across sessions.
Network timeline analysis: Tracks network usage over time to spot anomalies.
Check duration
A Device Intelligence Check takes an average of 2 seconds to complete.
Last updated
Was this helpful?

