Run Check
The Run Check feature lets you validate and score user data directly from the Trustfull Dashboard. Select a product, enter the required data points, and receive real-time risk and trust signals — no API integration needed.
Before running a check, make sure to select the appropriate App Key from the header dropdown. This ensures that queries are correctly tracked and billed under the right application.
Your account must have sufficient credit balance to run checks. If your balance is too low, the Run Check form will be disabled until credits are topped up.
Getting Started
Navigate to Run Check from the Dashboard sidebar. You are presented with a selection of product cards:
- Phone — Validate phone numbers and carrier information.
- Email — Check email validity and reputation scores.
- IP Address — Analyse IP addresses for fraud signals.
- Domain — Assess domain age and trustworthiness.
- Onboarding — Verify new users with comprehensive identity checks.
- Login — Secure authentication verification flow.
Click on a product card to open the corresponding check page.
Product Check Pages
Once you select a product, the check page is divided into two main areas:
Feature Tabs
At the top of the page, a set of horizontal tabs highlights the capabilities of the selected product. Each tab provides a short summary of the signals Trustfull will collect. These tabs are informational and help you understand what the check covers before submitting.
The available tabs vary by product:
| Product | Tabs |
|---|---|
| Phone | Phone Validation, Carrier Lookup, Online Presence, Image Analysis, Breach Monitoring |
| Email Validation, Online Presence, Company Info, Image Analysis, Breach Monitoring | |
| IP Address | Geolocation, IP Masking, IP to Mobile, IP to Company |
| Domain | Domain Verification, Website Screening, Online Presence, Digital Advertising, Web Reviews, Marketplace Activity |
| Onboarding | Name Check, Email Analysis, Phone Verification, IP Intelligence |
| Login | Typing Biometrics, Behavioral Analysis, Device Fingerprint, IP Intelligence |
Input Form
Below the feature tabs you will find the input form. Fill in the required fields and click Run check to submit. The button is located at the bottom-right corner of the form and becomes active only when all required fields are valid.
Phone
The Phone check requires a single input: the phone number in international format.
A country code picker is displayed alongside the input field. The country prefix is automatically pre-filled based on your browser locale. Select the appropriate country from the dropdown or type to search, then enter the phone number.
Click Run check to submit. Trustfull validates the number and returns signals including:
- Phone validation — format check, line type (mobile/landline), disposable number detection.
- Carrier lookup — current and original mobile network operator, porting history and SIM swap signals.
- Online presence — messaging app activity (WhatsApp, Telegram), social media profiles, and linked online services.
- Image analysis — profile picture analysis from messaging apps, face matching, AI-generated image detection.
- Breach monitoring — data breach exposure, leaked credentials, and breach history.
A trust score (0–1000) and score cluster are returned alongside the collected signals and any triggered reason codes.
You are automatically redirected to the results detail page once processing completes. Results are also saved under Lookups > Phone Number in the navigation menu.
For a complete list of returned fields, see the Phone Data Schema. For API integration details, see the Phone API reference.
Email
The Email check requires a single input: the email address.
Enter a valid email address in the text field and click Run check. Trustfull analyses the address and returns signals including:
- Email validation — deliverability status, disposable and catch-all detection, role-based address flagging, domain age and MX records.
- Online presence — linked profiles on social media, e-commerce platforms, and professional networks.
- Company info — company name, industry, employee count, and social profiles derived from the email domain.
- Image analysis — profile picture verification from email-associated platforms, face matching, and AI-generated image detection.
- Breach monitoring — data breach exposure, number of breaches, first and last breach dates.
A trust score (0–1000) and score cluster are returned alongside the collected signals and any triggered reason codes.
You are automatically redirected to the results detail page once processing completes. Results are also saved under Lookups > Email Address.
For a complete list of returned fields, see the Email Data Schema. For API integration details, see the Email API reference.
IP Address
The IP Address check requires a single input: the IP address (IPv4 or IPv6).
Enter a valid IP address in the text field and click Run check. Trustfull returns signals including:
- Geolocation — country, city, postal code, latitude/longitude, and timezone with high precision.
- IP masking — VPN, proxy, Tor, and relay detection with provider name identification.
- IP to mobile — mobile carrier identification, MNC and MCC codes for mobile IPs.
- IP to company — company name, industry, employee count, revenue, and tech stack derived from IP ownership.
A trust score (0–1000) and score cluster are returned alongside the collected signals and any triggered reason codes.
You are automatically redirected to the results detail page once processing completes. Results are also saved under Lookups > IP Address.
For a complete list of returned fields, see the IP Data Schema. For API integration details, see the IP API reference.
Domain
The Domain check requires a single input: the domain name (e.g. example.com). A country dropdown is also available to provide regional context for the analysis.
Click Run check to start the analysis. Domain checks are processed asynchronously and involve multiple enrichment steps. A progress bar is displayed during processing, showing the current step and an estimated time remaining. The full analysis typically takes up to 75 seconds and includes:
- Domain verification — DNS resolution, WHOIS and registration data, domain age, SSL certificate validation.
- Website screening — website existence and taxonomy classification (active site, parked domain, redirect, error page), page structure analysis, tech stack detection.
- Online presence — LinkedIn company profile (follower count, company size, article activity), Facebook, Instagram and X presence.
- Digital advertising — active ad campaign detection and advertising footprint.
- Web reviews — Google My Business profile, review volume, rating and sentiment analysis.
- Marketplace activity — presence on marketplaces and business directories.
If the analysis takes longer than expected, a warning message will appear. The results will still be delivered once processing is complete.
While the check is running, the Run check button is disabled to prevent duplicate submissions. A trust score (0–1000) and score cluster are returned alongside the collected signals and any triggered reason codes. Once the analysis completes, you are automatically redirected to the results detail page. Results are also saved under Lookups > Domain.
For a complete list of returned fields, see the Domain Data Schema. For API integration details, see the Domain Intelligence API reference and the Get Domain API.
Onboarding
The Onboarding check runs a comprehensive identity verification across multiple data points. The form presents five fields:
- First Name (required)
- Last Name (required)
- Email Address (required)
- Phone Number (required) — with a country code picker, same as the Phone check
- IP Address (optional)
All four required fields must be filled in before the Run check button becomes active. If any required field is missing, an error message is displayed when you attempt to submit.
Click Run check to submit. Trustfull cross-references the provided data across all input fields and returns:
- Individual product signals — each data point (phone, email, IP) is independently analysed and scored, producing the same signals described in the corresponding single-product sections above.
- Cross-product consistency checks — name-to-phone matching, name-to-email matching, email-to-phone linking, IP-to-phone country consistency, and other cross-referencing signals.
- Combined trust score — a global score (0–1000) built using a model that takes into account all individual modules. This is more than an average of single scores — it detects inconsistencies between data points that may indicate synthetic identities.
The combined score, individual product scores, and any triggered reason codes are all returned. You are automatically redirected to the results detail page once processing completes. Results are also saved under Lookups.
For a complete list of returned fields, see the Onboarding Data Schema. For API integration details, see the Onboarding API reference.
Login
The Login check lets you simulate a login flow and test Trustfull's account takeover detection capabilities. Unlike other products, it uses a two-step process:
Step 1 — Enrollment A mock login form is presented with a Username and Password field. Create fictitious credentials and click Next. During this step, your typing patterns and device signals are captured in the background to establish an enrollment baseline. A QR code is also generated so you can repeat the same flow from a mobile device if needed.
The credentials you enter are not real — they are used exclusively for the simulation.
Step 2 — Verification The form resets and asks you to re-type the same credentials. Trustfull compares your typing patterns with the enrollment signals collected in Step 1 to verify your identity. Click Next to submit.
The Login check analyses signals including:
- Typing biometrics — micro patterns in how users type, available across languages and keyboard configurations.
- Behavioral analysis — mouse activity patterns, touchscreen behavior, click rates, and interaction anomalies.
- Device fingerprint — device, browser and OS information, anti-fingerprinting extension detection, emulator and virtual machine identification.
- IP intelligence — geolocation comparison across login attempts, impossible travel detection, VPN/proxy/Tor usage.
Once both steps are complete, a result screen is displayed showing the outcome:
- Success — the typing patterns match, indicating a legitimate login.
- Warning — partial match, suggesting a moderately suspicious login.
- Fail — patterns do not match, indicating a high-risk login attempt.
You can click Start over to reset the simulation and try again.
For details on integrating Login into your own application, see the Login Integration Guide. For API details, see the Login Enrollment API and Login Score API. For a full list of returned fields, see the Login Data Schema.
Understanding Scores
Every Run Check returns a trust score ranging from 0 to 1000, along with a score cluster that summarises the result:
| Score Cluster | Meaning |
|---|---|
| very_high | Strong trust signals — very low risk. |
| high | Good trust signals — low risk. |
| review | Mixed signals — manual review recommended. |
| low | Weak trust signals — elevated risk. |
| very_low | Poor trust signals — high risk. |
Each result also includes reason codes — specific risk and trust signals that explain why a particular score was assigned. For a full list of reason codes and their descriptions, see the Reason Codes page.
Viewing Results
After any check is submitted, Trustfull processes the data and automatically redirects you to a dedicated detail page. This page shows the full results, including:
- The overall trust/risk score and score cluster.
- All collected signals and data points specific to the product.
- Any triggered reason codes explaining risk or trust indicators.
All past checks are stored and can be accessed at any time from the Lookups section in the navigation menu, organised by product type.
Updated about 19 hours ago