Make smart, data-driven decisions with Smart Signals to prevent increasingly sophisticated fraud and improve positive experiences for trusted users.
Start Free TrialImport your fraud data
CSV file
Flag risk without building a model.
Smart Signals are weighted and combined into one score, ready to power your existing risk engine.
Trained on your fraud data.
Upload labeled traffic, Fingerprint trains the model and returns optimized weights.
You stay in control.
Preview the impact on precision and recall before any change goes live. Your team approves update.
User behavior signals
Detect if a user is trying to hide their identity or history.
Identify browser spoofing incidents and suspicious browser signature anomalies.
Ensure a safe Android mobile application environment by detecting rooted devices.
Indicates if a request is initiated from a privacy-focused browser (e.g. Tor) or from a browser whose anti-fingerprinting settings are enabled.
Flag devices with unusually high activity levels in the past 24 hours.
Correlate and identify important data points per visitor at three distinct time-based intervals with Velocity Signals.
Network signals
Accurately determine the location of the actual IP address.
Determine if a user is leveraging a VPN to conceal their identity by validating that their IP time zone matches their browser time zone.
See when an IP address matches a known database of malicious actors and spammers.
Bot detection signals
Identify automated tools, friendly search bots, and other sophisticated threats in real time.
Learn morePrevent spam and protect against nefarious Android emulator farms by ensuring the request is coming from a physical device.
Identify if a request is coming from a virtual machine.
Device data signals
Receive an additional set of data including 35 raw browser identification attributes.
A weighted value of all available Smart Signals, identifying suspicious activity.
Mobile device signals
Identify if a request is coming from a cloned application. (Android only)
Identifies if a visitor is using an iPhone which has been jailbroken. (iOS only)
Indicates if the open source tool Frida has been used to tamper with the app.
Indicates the exact time a device was reset to its factory settings, which results in wiping all of the user-sensitive data.
Indicates if the user has spoofed the location of their mobile device.
Determine if a user is leveraging a VPN to conceal their identity on a mobile device.
Spots if requests made to Fingerprint were intercepted or altered.
Detects if critical device properties were changed or faked.
Web and mobile device identification.
up to 1,000 API calls per month
Includes:
14 day free trial of Pro Plus plan
Fingerprint Identification
Android Smart Signals
500k Android API calls/mo
Everything you need starting at
then $4 per 1,000 additional API calls
Includes:
Fingerprint Identification
Smart Signals
Android Smart Signals
iOS Smart Signals
500k Android API calls/mo
Build your own plan.
Customize your plan:
Fingerprint Identification
Access to Additional Smart Signals*
99.9% SLA
Enterprise-grade compliance and security
Proxy integrations
Customer success manager