PRODUCTS

Overview

The Trustfull Platform allows you to analyse different types of risks based on the user information and use case. The following table shows you what you can do with Trustfull:

PRODUCTDESCRIPTION
Trustfull PhoneEvaluates phone numbers in real time to assess trust and fraud risk. It detects VoIP and virtual numbers, validates line type and country, and analyzes reputation and usage patterns to identify fake or abusive activity, providing clear risk signals and reason codes to protect signups, logins, and transactions without harming conversion.
Trustfull EmailEvaluates email addresses in real time to assess trust and fraud risk. It detects disposable and high-risk emails, analyzes domain reputation, email age, and deliverability, and provides clear risk signals and reason codes to help prevent fake signups, abuse, and fraud without impacting legitimate users.
Trustfull IPEvaluates IP addresses in real time to assess network-level trust and fraud risk. It detects proxies, VPNs, Tor usage, data centers, and risky ASNs, and analyzes geolocation and reputation signals to help identify suspicious activity early.
Trustfull OnboardingProtects account creation and user onboarding flows by detecting fake users, bots, and abusive behavior in real time. It combines email, phone, IP, and name to assess risk at signup, enabling progressive friction or blocking only when needed.
Trustfull LoginProtects authentication flows by detecting suspicious login activity in real time. It combines IP, device, identity, and behavioral signals to identify bots, credential stuffing, and account takeover attempts, enabling risk-based decisions such as step-up authentication or blocking.
Trustfull SessionAnalyzes user behavior across a session to detect anomalies, automation, and abuse in real time. By correlating device, network, and behavioral signals, it can distinguish malicious bots from legitimate AI agents and human users, enabling dynamic, risk-based actions without disrupting genuine activity.
Trustfull DomainAnalyzes internet domains in real time to assess trustworthiness and fraud risk. It evaluates domain age, reputation, DNS and MX configuration, and known abuse patterns to detect disposable, newly registered, or malicious domains.
Email DisposableEnables you to determine whether an email address is associated with a temporary or disposable provider. This check is a valuable tool in fraud prevention workflows, helping you assess the trustworthiness of user-provided emails.
Phone ValidationUsed for parsing, validating, and formatting international phone numbers. It provides standardized logic to identify country codes, number types (mobile, fixed line, VoIP), validity based on regional numbering plans, and original network name.
Phone DisposableEnables you to detect whether a phone number is associated with a temporary or disposable phone service provider (e.g., freemsg.net, anonymsms.com)
IP Proxy DetectionDetermines whether an IP address exhibits characteristics associated with anonymization or masking services, such as VPNs, proxies, relays, or Tor nodes. It also detects residential proxy traffic, a technique increasingly used in fraud operations. Residential IPs originate from legitimate consumer ISP ranges, making them harder to identify as risky
Phone Data BreachesProvides information about known data breaches associated with a given phone number. It returns both a summary and detailed information on individual breaches, including dates, sources, and data linked to the phone owner such as name, emails, date of birth, and address.
Phone PortabilityProvides detailed insights into the history and current status of a phone number as it moves between mobile network operators. Given a phone number, the API validates its format and returns whether the number has been ported, the original and current carrier names and network codes, and how many times the number has changed operator.
Phone to NameAllows you to retrieve the most plausible name associated with a given phone number from an heterogeneous set of data sources including a level of confidence.
Trustfull DocumentComing soon
Trustfull DeviceComing soon

Products by fraud type

This table outlines common fraud types across the user lifecycle and maps each use case to the Trustfull products best suited to detect and prevent them. It highlights how different fraud patterns emerge at signup, during account changes, at login, or through automated abuse and shows which signals and solutions are most effective at each stage.

FRAUD TYPE/USE CASEDESCRIPTIONPRODUCTS
Fake Identity SignupsSynthetic-identity fake signups occur when fraudsters create accounts using entirely manufactured identities, supported by fake or low-quality contact points (email, phone) and masked network infrastructure (VPNs, proxies, residential IPs).Trustfull Onboarding, Trustfull Phone, Trustfull Email
Profile Update FraudProfile-update fraud happens when a user modifies key account attributes after signup (email, phone, or device) to either hide a synthetic identity, take over an account, or prepare it for downstream fraud. This phase is often more dangerous than signup, because the account already carries trust signals.Trustfull Phone, Trustfull Email
Account TakeoverAccount Takeover (ATO) is a type of fraud where an attacker gains unauthorized access to a legitimate user's account and then uses, modifies, or locks that account for financial gain, abuse, or further fraud. Unlike fake signups, ATO targets real users with real history and trust.Trustfull Login
Bot AttackA BOT attack is an automated attack where software programs (bots) simulate human behavior to interact with websites, apps, or APIs at scale. In fraud contexts, bots are used to abuse features faster, cheaper, and more consistently than humans. BOT attacks are often the engine behind large-scale fraud operations.Trustfull Session
Account SharingAccount sharing fraud occurs when multiple people intentionally use the same account, violating platform terms that restrict access to a single individual or household. While sometimes casual (e.g. password sharing), it becomes fraud when used to avoid paying, bypass limits, or resell access.Trustfull Session, Trustfull Device
Promo AbusePromo abuse is a type of fraud where users exploit promotional offers such as signup bonuses, free credits, discounts, or referral rewards in ways not intended by the platform to gain unfair or repeated benefits. It is one of the most common and scalable fraud types, especially when combined with fake signups, bots, or synthetic identities.Trustfull Onboarding
Refund FraudRefund fraud occurs when users abuse refund, return, or chargeback processes to obtain money, credits, or products without legitimately giving up value. It exploits the fact that refund systems are designed to favor customer trust and speed. Refund fraud can be intentional and organized, or opportunistic and repeated.Trustfull Onboarding
OTP AbuseOTP abuse is a type of fraud where attackers exploit One-Time Password (OTP) mechanisms, via SMS, email, or authenticator apps, to bypass security controls, test accounts, or harass users. OTPs are meant to protect accounts, but when abused, they become an attack surface.Trustfull Phone, Phone Disposable, Phone Validation, Trustfull Session, Trustfull IP
Payment FraudPayment fraud occurs when a transaction is completed using unauthorized, manipulated, or abusive payment methods, causing financial loss to merchants, platforms, or financial institutions. It most commonly affects online and card-not-present (CNP) transactions, where the payer is not physically present. Payment fraud is often the end goal of other fraud types (fake signups, ATO, promo abuse).Disposable Phone, Disposable Email, Trustfull IP, IP Proxy Detection
Fake LeadsFake leads fraud occurs when non-genuine contacts are submitted through lead-generation channels (forms, ads, demos, trials) with no real intent to buy. These leads are created by bots, farms, competitors, or malicious actors to exploit incentives, drain budgets, or poison sales pipelines. Fake leads look legitimate on the surface but they never convert.Trustfull Onboarding, Trustfull Session
Document FraudDocument fraud occurs when forged, altered, stolen, or manipulated documents are used to misrepresent identity, eligibility, or legitimacy in order to gain access to services, accounts, funds, or benefits. It is a core enabler of identity-based fraud, especially in onboarding, KYC, lending, fintech, crypto, and high-risk marketplaces.Trustfull Onboarding Trustfull Document
Age Verification FraudAge verification fraud occurs when users intentionally bypass or manipulate age checks to access age-restricted products, services, or content they are not legally or contractually allowed to use. It targets platforms where age gates are tied to legal compliance, safety, or monetization.Phone to Name, Trustfull IP
Fake MerchantFake merchant fraud occurs when fraudsters create merchant or seller accounts that appear legitimate in order to process fraudulent transactions, launder money, or scam customers. These "merchants" are not real businesses, they are fronts designed to abuse payment systems and marketplaces. This fraud type targets merchant onboarding, KYB checks, and trust systems.Trustfull Domain
Fake ReviewsFake reviews fraud occurs when false, misleading, or manipulated reviews are posted to artificially inflate or damage ratings, rankings, and reputation on digital platforms. These reviews do not reflect genuine user experience and are created to influence decisions. Fake reviews directly attack the trust layer of marketplaces, apps, ecommerce, and SaaS platforms.Trustfull Onboarding, Trustfull Session