Smart Signals Introduction
Smart signals give you actionable device intelligence for browsers and devices interacting with your application.
In addition to visitor identification, Fingerprint provides actionable device intelligence insights called Smart Signals. They provide details on suspicious browser or device configurations, which can indicate malicious intent. For example, you can detect bots, VPN usage, tampered browsers, or jailbroken iPhones and adjust your business logic accordingly. Read our blog post to learn how to get the most out of Smart Signals.
Availability
The availability of each Smart Signal depends on the platform (Browser, Android, or iOS) and your billing plan.
- Most Smart Signals are available in the Pro Plus plan. These three signals are currently only available for Enterprise customers: IP Blocklist, High-Activity Device, and Raw Device Attributes.
- Enterprise plans are customized for each customer. If you are an Enterprise customer interested in one or more of these signals, please contact our support team to enable them for you. Signing up for an Enterprise plan does not automatically enable all Smart signals.
See Pricing or Smart Signals Reference for more details.
Setup and Usage
Smart Signals are computed using the same device attributes collected for visitor identification. If you haven't already, install the JavaScript agent on your website, or add the Android, or iOS agent to your mobile application to make identification requests.
Unlike the visitor ID, Smart Signals are not available in the identification response sent back to the client agents. Because Smart Signals are focused on fraud detection, we only make them available through our Server API, Webhooks, and Sealed Client Results so we can ensure you receive those results unaltered.
For example, you can:
- Get the
requestId
from the JavaScript agent identification response and pass it to your server. - Call the GET /events endpoint from your server-side environment and retrieve the Smart Signals in the API response.
- Use the Smart Signals information in your fraud prevention logic.
Some signals apply to all platforms and some are specific to browsers, Android, or iOS devices. You can see a brief overview of all available signals in the tables below. For detailed information about each signal, see the Smart Signals Reference.
Suspect Score
Suspect Score is a quick and easy way to integrate Smart Signals into your fraud protection workflow. It is a weighted average of all Smart Signals indicating how unusual or suspicious the device is in a single number.
The more Smart signals return a positive result, the higher the Suspect Score. You can customize how much each Smart signal contributes to the final Suspect Score. See Suspect Score for more details.
Browser Smart Signals
Name | Description |
---|---|
Bot Detection | Indicates bots and automated browsers like Selenium or Puppeteer. |
Browser Tampering Detection | Indicates visitors are trying to avoid identification by using anti-detect browsers or manually altering their browser configuration. |
Developer Tools Detection | Indicates Developer tools are open when the page loads. |
Incognito Detection | Indicates visitors are using Incognito or Private browsing mode. |
Privacy-Focused Settings | Indicates the browser is set to actively prevent fingerprinting, for example, Brave. |
Raw Device Attributes | Provides raw device attributes collected by the JavaScript agent. Enterprise plan only. |
Remote Control Tools Detection | Indicates the device running the browser is being controlled remotely. |
VPN Detection | Indicates visitors are using a VPN to conceal their true IP address and location. |
Virtual Machine Detection | Indicates the browser is running inside a virtual machine. |
Smart Signals for mobile devices
Name | Description | Android | iOS |
---|---|---|---|
Android Emulator Detection | Indicates your application is running inside an Android emulator instead of a physical device. | ✅ | ❌ |
Rooted Device Detection | Indicates your application is running inside a rooted Android device. | ✅ | ❌ |
Cloned App Detection | Indicates your application has been cloned and is present multiple times on the same device. | ✅ | ❌ |
Factory Reset Detection | Indicates the mobile device has been factory reset. | ✅ | ✅ |
Frida Detection | Indicates your application is being tampered with using Frida. | ✅ | ✅ |
Geolocation Spoofing Detection | Indicates the mobile device is trying to spoof its location. | ✅ | ✅ |
Jailbroken Device Detection | Indicates your application is running on a jailbroken iOS device. | ❌ | ✅ |
VPN Detection | Indicates the mobile device has an active VPN connection. | ✅ | ✅ |
Smart Signals common for browsers and mobile devices
Name | Description |
---|---|
High-Activity Device | Detect if the device is among the top 2% of devices most frequently identified by your Fingerprint application. Enterprise plan only. |
IP Geolocation | Get the visitor's location based on their IP address. |
IP Blocklist | See if the visitor's IP address belongs to a known proxy, or a TOR node, or is associated with a previous SPAM or network attack. Enterprise plan only. |
Velocity Signals | Detect unusually high numbers of IP addresses, countries, or linked IDs associated with a single device in a short period. |
Updated 14 days ago