Key Features
Device Intelligence
Fingerprint devices and detect emulators, VPNs, and proxies
Velocity Checks
Monitor transaction patterns and detect anomalies
Blocklists
Manage device, IP, and user blocklists
Risk Scoring
Real-time risk scores with sub-50ms response times
Base URL
Authentication
All requests require a Bearer token:Quick Start
Endpoints
| Method | Endpoint | Description |
|---|---|---|
| POST | /fraud/assess | Assess fraud risk |
| POST | /fraud/device/fingerprint | Register device fingerprint |
| GET | /fraud/device/{id} | Get device details |
| POST | /fraud/blocklist | Add to blocklist |
| GET | /fraud/blocklist | List blocklist entries |