Device Intelligence
Detect fraud risk using device fingerprinting, tamper signals, and network indicators (VPN, emulator, root/jailbreak).
About service
The Device Intelligence check uses device fingerprinting and device risk signals to detect fraud. It inspects the device and network connection to identify tampering, automation, and suspicious behaviour.
This service supports a range of device types, including:
Mobile phones
Tablets
Laptops and desktop PCs
Kiosks and POS terminals
This service helps ensure that only trusted and genuine devices are used during customer onboarding.
Common use cases
Use Device Intelligence to reduce fraud across key customer journeys:
KYC onboarding and account opening: Spot high-risk devices early in your Workflows.
Account takeover (ATO): Detect unusual device fingerprints and network changes.
Bot protection: Identify automated sessions and scripted sign-ups.
Promo and referral abuse: Flag device reuse across multiple accounts.
Analysis performed
The check performs device, network, and bot risk assessments. It also tracks signals over time to identify repeat fraud patterns.
Detailed verification checks
Device Analysis
Previously enrolled device: Flags devices reused across multiple customer accounts.
Emulator detection: Flags attempts to use virtualized or emulated devices.
Rooted/Jailbroken device: Detects compromised operating systems with escalated privileges.
Cloned app: Identifies duplicate or cloned versions of applications.
Browser tampering: Detects altered or suspicious browser setups.
Virtual machine: Flags devices running inside virtual environments.
Location spoofing: Detects falsified or masked geolocation signals.
Frida detection: Detects mobile debugging and manipulation frameworks.
Network Analysis
VPN detection: Identifies usage of Virtual Private Networks.
Relay detection: Detects relay service providers.
Bot Analysis
Bot detection: Detects whether sessions are automated or bot-driven.
Timeline Analysis
Device timeline analysis: Monitors device behavior patterns across sessions.
Network timeline analysis: Tracks network usage over time to spot anomalies.
Check duration
A Device Intelligence Check takes an average of 2 seconds to complete.
Related checks
Combine Device Intelligence with other fraud intelligence signals:
Email Intelligence for email reputation and threat signals, including disposable email detection and breach exposure.
Mobile Intelligence for phone number risk scoring and reputation signals.
Related topics
Use these to run Device Intelligence Check inside a broader KYC orchestration and decisioning:
Workflows to orchestrate verification checks into a unified customer journey.
Policies to enforce consistent decision logic across different journeys.
Advanced Case Management to handle exceptions, assign tasks, and manage reviewer decisions.
Last updated
Was this helpful?

