Risk Signal Reference

Risk signals

Keyri evaluates risk data and outputs relevant signals that can be used to detect fraudulent activity. Further, Keyri’s real-time fraud prevention system enables you to choose whether to allow, warn, or deny user events based on these signals. Understanding risk signals, and how to handle them, is key to preventing fraud specific to your business.

Types of Risk signals

Keyri risk signals fall into three categories: device-based signals, account-based signals, and IP-based signals. Keyri has over 100 customizable signals for enterprises to choose from, but the below list is intended to provide an overview of common risk signals that can be utilized by self-service customers.

Device-Based Signals

SignalDescription
Multiple Account Signups per DeviceThe device attempting to register a new account has been used to register other accounts previously. Potential attacks include fake account creation, referral / promo abuse, identity fraud, and bot attacks.
Multiple Account Access per DeviceThe device attempting to enact this event has been used for events with other accounts previously. Potential attacks include account takeovers, fake account creation, referral / promo abuse, identity fraud, and bot attacks.
Max Events per Time FrameThe device has attempted too many events in a predetermined time frame. Potential attacks include DDoS, brute force, and bot attacks.
Emulated DeviceThe device is running a program that allows a computer to emulate a mobile device. Potential attacks include fake account creation, referral / promo abuse, and bot attacks.
Jailbroken / RootedThe mobile device has been modified to remove restrictions imposed by the manufacturer or operator, e.g. to allow the installation of unauthorized software.
Swizzled / TamperedThe mobile device’s software or hardware has been interfered with.
Dangerous Apps / Malicious PkgsThe device contains vulnerabilities or malicious code delivered through the software supply chain.
DebuggableThe device is acting as if it is in development even though it is in production, signaling potential nefarious activity.

Account-Based Signals

SignalDescription
New DeviceThe account has not previously seen an event with this device.
Improbable TravelThe account has enacted an event from an IP address that is too far away from a previous event IP address in the allotted time period (e.g., a user logging in from San Francisco and then logging in from New York one hour later). Note: This signal will not be displayed if one of the events comes from a VPN, Proxy, or TOR.
New IP CountryThe account has not previously seen an event with an IP address in a given country.

IP-Based Signals

SignalDescription
VPN / ProxyThe IP address for the event is a VPN or proxy, signaling that the user may not want you to know their location.
TORThe IP address for the event is a TOR, signaling that the user almost certainly does not want you to know their location.
Suspicious IPThe IP address for the event has a low trust score and the user may be a bad actor.