← Back to use cases

Payment Fraud

Payment fraud revolves around online financial transactions for goods or services. We provide a reliable identification signal that significantly allows our customers to improve their credit card anti-fraud workflows.

What is Payment Fraud?

Payment fraud revolves around online financial transactions for goods or services. The keyword is “payment.” This nefarious activity occurs when fraudsters obtain stolen credit, debit, or checking data. Then that fraudster uses the stolen financial data to make an unauthorized purchase, pretending to be the card or account owner. Often, the criminal will quickly sell the item or items purchased illegally to obtain cash.

Why is Payment Fraud Important?

Payment Fraud is a serious issue for businesses that store, handle or process payment information. By processing stolen card data, fraudsters can leverage your business for money laundering operations or unauthorized goods/services that will create chargebacks. Chargebacks are when a merchant must return payment for an unauthorized transition and sometimes incurs a fee. Chargebacks directly impact margins, your business reputation, and customer service and financial accounting overhead.

Why Fingerprint

Many businesses that build a sophisticated anti-fraud system consider suspicious flag purchases of a visitor’s device, IP address, and browser fingerprint. However, some fraudulent purchases still fall through the cracks. These companies find that the accuracy of their current fingerprinting solution is too low to catch all fraudulent activity, resulting in chargebacks, lost revenue, and a threat to their seller reputation.

After comparing Fingerprint Pro with existing browser identifiers, most find Fingerprint Pro’s visitorIDs unparalleled in accuracy and contain far fewer false positives. We provide a reliable identification signal that significantly allows our customers to improve their credit card anti-fraud workflows.

How to Increase Account Growth by Identifying & Preventing Payment Fraud

Fingerprint Pro provides a unique identifier for every visitor to your website (the visitorId) collected behind the scenes anytime someone performs a specific action with our JavaScript fingerprinting agent installed. Since malicious attackers might forge this data, Fingerprint Pro also provides tools for validating these identifiers sent by your front end. As a result, you will protect your users and your business against various payment frauds with the proposed approaches. At the same time, your legit users won’t experience any additional friction while performing their payments.

Since you know your product and business landscape best, it’s up to you to decide how to configure anti-fraud workflows to utilize the visitorId to catch fraud on your website. Below, we have described some steps and best practices for your custom solution as a starting point.

Configuring Fingerprint Pro for Payment Fraud prevention

To use Fingerprint Pro effectively to prevent payment frauds such as credit card cracking, chargeback fraud, or stolen card abuse, you should configure logic that utilizes the visitorId among other timestamped data in conjunction with information provided by a user. Therefore, it is crucial to think through the logic used to determine suspicious activity and that the correct actions are taken when a visitor is flagged.

Suspicious Activity Logic

When a visitor attempts to pay for an order, we recommend sending the visitorId, requestId, and credit card data to your application server, where they persist in the storage layer. Using this data, you can compare the current visitorId and credit card pairing to previous attempts to catch threats.

Here are the recommended logic rules for Payment Fraud prevention:

// Initialize the agent
const fpPromise = import('https://fpjscdn.net/v3/your-public-api-key')
  .then(FingerprintJS => FingerprintJS.load({
    endpoint: 'https://metrics.yourdomain.com'

// Once you need a result, get and store it.
// Typically on page load or on button click.
  .then(fp => fp.get())
  .then(fpResult => {result = fpResult})

The endpoint property is quite important and is used for the custom subdomain setup. Using a subdomain is required for correct identification while using Fingerprint Pro.

  • Send the user’s credit card data together with visitorId and requestId to your API.
const orderData = {

const response = await fetch('/api/place-order', {
  method: 'POST',
  body: JSON.stringify(orderData),
  headers: {
    'Content-Type': 'application/json',
    Accept: 'application/json',

All next steps should be performed on the backend. If your backend logic is built on top of Node.js, you can use Fingerprint Server API Node.js SDK.

  • Check if the request contains valid visitorId and requestId. Stop users with forged data.
const visitorId = req.body.visitorId;
const requestId = req.body.requestId;

const isRequestIdFormatValid = /^\d{13}\.[a-zA-Z0-9]{6}$/.test(requestId);
const isVisitorIdFormatValid = /^[a-zA-Z0-9]{20}$/.test(visitorId);

if (!isRequestIdFormatValid || !isVisitorIdFormatValid) {
  return getForbiddenReponse();
const fingerprintJSProServerApiUrl = new URL(

fingerprintJSProServerApiUrl.searchParams.append('request_id', requestId);

const visitorServerApiResponse = await fetch(
  fingerprintJSProServerApiUrl.href, { method: 'GET', headers: { 'Auth-API-Key': 'secret-api-key' } }

// If there's something wrong with provided data, Server API might return non 200 response.
// We consider these data unreliable.
if (visitorServerApiResponse.status !== 200) {
  // Handle error internaly, refuse the action.

const visitorData = await visitorServerApiResponse.json();
return visitorData;
  • The Server API response must contain information about this specific identification request. If not, the request might have been tampered with and we don't trust this identification attempt.
if (visitorData.error || visitorData.visits.length !== 1) {
  return getForbiddenReponse();
  • An attacker might have acquired a valid requestId and visitorId via phishing. It's recommended to check the freshness of the identification request to prevent replay attacks.
if (new Date().getTime() - visitorData.visits[0].timestamp > 3000) {
  return getForbiddenReponse();
  • The Confidence Score reflects the system's degree of certainty that the visitor identifier is correct. If it's lower than the certain threshold we recommend using an additional way of verification, e.g. 2FA or email.
if (visitorData.visits[0].confidence.score < 0.95) {
  return getForbiddenReponseAndChallenge();
  • We want to check if the order request comes from the same IP address as the identification request.
// This is an example of obtaining the client IP address.
// In most cases, it's a good idea to look for the right-most external IP address in the list to prevent spoofing.
if (
  request.headers['x-forwarded-for'].split(',')[0] !==
) {
  return getForbiddenReponse();
  • Checks if the order request comes from a known origin and if the order request's origin corresponds to the origin provided by the Fingerprint Pro Server API. Additionally, one should also set the Request Filtering in the dashboard.
const ourOrigins = [

const visitorDataOrigin = new URL(visitorData.visits[0].url).origin;
if (
  (visitorDataOrigin !== request.headers['origin'] ||
    !ourOrigins.includes(visitorDataOrigin) ||
) {
  return getForbiddenReponse();
  • In real-world applications, we want to prevent chargeback frauds. Check if this visitorId has a positive chargeback history. Prevent users with positive chargeback history from placing new orders without further investigation.
// Gets all chargebacks during the last 365 days for the visitorId.
const countOfChargebacksForVisitorId = await db.query("SELECT COUNT(*) AS count FROM payment_attempts WHERE visitor_id = ? AND is_chargebacked = 1 AND timestamp > ?", [visitorId, new Date().getTime() - 365 * 24 * 60 * 1000]);

// If the visitorId performed more than 1 chargeback during the last 1 year we do not process the payment.
// The count of chargebacks and time window might vary.
if (countOfChargebacksForVisitorId.count > 1) {
  return getForbiddenReponse();
  • We typically want to forbid placing orders for users who historically used stolen cards.
// Get all attempts with a stolen credit card for the given visitorId.
const stolenCardUsedCount = await db.query("SELECT COUNT(*) AS count FROM payment_attempts WHERE visitor_id = ? AND used_stolen_card = 1", [visitorId]);

// If the visitorId performed more than 1 payment with a stolen card during the last 1 year we do not process the payment.
// The time window duration might vary.
if (stolenCardUsedCount.count > 0) {
  return getForbiddenReponse();
  • Card cracking (also known as carding) happens when fraudsters look to exploit the systems of e-commerce businesses to gather credit card information. Fraudsters may have obtained partial card information beforehand, or they can be starting from scratch. We typically want to forbid placing orders to users who historically used stolen cards as we did in the previous step or those who try the excessive amount of credit card details.
// Gets all unsuccessful attempts for the visitorId during the last 365 days.
const invalidCardAttemptCountQueryResult = await db.query("Select COUNT(*) as count from payment_attempts where visitor_id = ? and timestamp > ? and check_result != 'Passed'", [visitorId, new Date().getTime() - 365 * 24 * 60 * 1000]);

// If the visitorId performed 3 unsuccessful payments during the last 365 days we do not process any further payments from them.
// The count of attempts and time window might vary.
if (invalidCardAttemptCountQueryResult.count > 2) {
  return getForbiddenReponse();

Challenge Actions

You can require additional verification or authentication steps to stop fraudsters from further progress for suspicious payment attempts as defined by your suspicious activity logic. In all the cases above, we suggest ignoring payment attempts, notifying possible account owners about the suspicious activity via email/SMS/phone, or challenging the attempted payment with two-factor authentication in specific scenarios.

Explore our Payment Fraud prevention demo

We have built a Payment Fraud prevention demo to demonstrate the above concepts. Use this demo to see how you can use Fingerprint Pro in conjunction with simple logic rules to protect a payment form. If you want to explore code, check our interactive Stackblitz demo or open-source GitHub repository. If you have any questions, please feel free to reach out to support@fingerprint.com.

Explore live technical demo

Trouble running the demo? Try opening it on Stackblitz in a Chromium-based browser without ad-blockers.

Join the community

Fingerprint’ open source technology is supported by contributing developers across the globe. Stay up to date on our latest technical use cases, integrations and updates.

Explore more technical use cases

coupon promo fraud

Coupon & Promo Abuse

Coupon abuse occurs when a customer or fraudster takes advantage of a business’s promotions for monetary gain—for example, a single fraudster redeeming the same promo code multiple times at checkout.

  • Payment
  • Cheating
  • Ecommerce
login screen


Most of your visitors are anonymous. Here’s how to tailor their experience without requiring sign-in.

  • Login
  • Authentication
  • Identity Management
login illustration for account sharing

Account Sharing Prevention

By leveraging Fingerprint’s Account Sharing capability, customers can access a prebuilt Account Sharing Solution that utilizes many signals and multiple techniques including fingerprinting.

  • Login
  • Authentication
  • Identity Fraud
  • SaaS
  • Identity Management
  • Media