Device Intelligence

Analyzes a customer’s device for signs of tampering or suspicious activity to assess fraud risk.

About service

The Device Intelligence check examines a customer’s device and its network connection to detect fraud signals.

This service supports a range of device types, including:

  • Mobile phones

  • Tablets

  • Laptops and desktop PCs

  • Kiosks and POS terminals

This service helps ensure that only trusted and genuine devices are used during customer onboarding.

Analysis performed

The check performs a wide range of device and network risk assessments.

Detailed verification checks

Analysis
Verifications Performed

Device Analysis

  • Previously enrolled device: Flags devices reused across multiple customer accounts.

  • Emulator detection: Flags attempts to use virtualized or emulated devices.

  • Rooted/Jailbroken device: Detects compromised operating systems with escalated privileges.

  • Cloned app: Identifies duplicate or cloned versions of applications.

  • Browser tampering: Detects altered or suspicious browser setups.

  • Virtual machine: Flags devices running inside virtual environments.

  • Location spoofing: Detects falsified or masked geolocation signals.

  • Frida detection: Detects mobile debugging and manipulation frameworks.

Network Analysis

  • VPN detection: Identifies usage of Virtual Private Networks.

  • Relay detection: Detects relay service providers.

Bot Analysis

  • Bot detection: Detects whether sessions are automated or bot-driven.

Timeline Analysis

  • Device timeline analysis: Monitors device behavior patterns across sessions.

  • Network timeline analysis: Tracks network usage over time to spot anomalies.

Check duration

A Device Intelligence Check takes an average of 2 seconds to complete.

Last updated

Was this helpful?