Mobile Intelligence
Phone number fraud detection and risk scoring. Verify mobile number reputation, activity, and abuse signals to reduce KYC onboarding fraud.
About service
Mobile Intelligence is a phone number fraud detection check. It analyzes a customer’s mobile number to assess risk using mobile network and reputation signals.
Use it to reduce onboarding fraud, catch high-risk numbers early, and a mobile number verification step when running deeper KYC checks.
Common use cases
Use Mobile Intelligence anywhere the phone number is a core identifier:
KYC onboarding and account opening: Flag risky phone numbers when running identity checks.
SMS OTP and phone ownership flows: Treat high-risk numbers as a step-up signal alongside SMS Verification.
Account takeover (ATO): Detect suspicious phone number changes and low-trust numbers.
Promo and referral abuse: Spot reused or abusive numbers across sign-ups.
Analysis performed
The check combines phone number verification and reputation signals to produce an overall mobile number fraud risk score.
Detailed verification checks
Risk Analysis
Valid format: Confirms that the mobile number follows correct international and regional formatting rules.
Recent abuse: Flags whether the number has been associated with recent fraudulent or abusive activity.
Activity: Assesses the number’s usage history to check if it is active or dormant.
Digital number analysis: Examines deeper digital risk signals such as carrier type and number reputation.
Risk level analysis: Generates a fraud risk score (0–100) indicating the overall likelihood of the number being compromised or fraudulent.
Check duration
A Mobile Intelligence Check takes an average of 2 seconds to complete.
Related checks
Combine Mobile Intelligence with other fraud intelligence signals:
Email Intelligence for email reputation, disposable email detection, and breach exposure.
Device Intelligence for device fingerprinting, VPN/emulator signals, and bot detection.
Related topics
Use these to run Mobile Intelligence inside a broader KYC workflow and decision flow:
Workflows to orchestrate Mobile Intelligence as a step in onboarding.
Compliance Policies to apply consistent rules using the returned risk signals.
Advanced Case Management to review exceptions and keep audit-ready decisions.

