PRODUCTS
Overview
The Trustfull Platform allows you to analyse different types of risks based on the user information and use case. The following table shows you what you can do with Trustfull:
| PRODUCT | DESCRIPTION |
|---|---|
| Trustfull Phone | Evaluates phone numbers in real time to assess trust and fraud risk. It detects VoIP and virtual numbers, validates line type and country, and analyzes reputation and usage patterns to identify fake or abusive activity, providing clear risk signals and reason codes to protect signups, logins, and transactions without harming conversion. |
| Trustfull Email | Evaluates email addresses in real time to assess trust and fraud risk. It detects disposable and high-risk emails, analyzes domain reputation, email age, and deliverability, and provides clear risk signals and reason codes to help prevent fake signups, abuse, and fraud without impacting legitimate users. |
| Trustfull IP | Evaluates IP addresses in real time to assess network-level trust and fraud risk. It detects proxies, VPNs, Tor usage, data centers, and risky ASNs, and analyzes geolocation and reputation signals to help identify suspicious activity early. |
| Trustfull Onboarding | Protects account creation and user onboarding flows by detecting fake users, bots, and abusive behavior in real time. It combines email, phone, IP, and name to assess risk at signup, enabling progressive friction or blocking only when needed. |
| Trustfull Login | Protects authentication flows by detecting suspicious login activity in real time. It combines IP, device, identity, and behavioral signals to identify bots, credential stuffing, and account takeover attempts, enabling risk-based decisions such as step-up authentication or blocking. |
| Trustfull Session | Analyzes user behavior across a session to detect anomalies, automation, and abuse in real time. By correlating device, network, and behavioral signals, it can distinguish malicious bots from legitimate AI agents and human users, enabling dynamic, risk-based actions without disrupting genuine activity. |
| Trustfull Domain | Analyzes internet domains in real time to assess trustworthiness and fraud risk. It evaluates domain age, reputation, DNS and MX configuration, and known abuse patterns to detect disposable, newly registered, or malicious domains. |
| Email Disposable | Enables you to determine whether an email address is associated with a temporary or disposable provider. This check is a valuable tool in fraud prevention workflows, helping you assess the trustworthiness of user-provided emails. |
| Phone Validation | Used for parsing, validating, and formatting international phone numbers. It provides standardized logic to identify country codes, number types (mobile, fixed line, VoIP), validity based on regional numbering plans, and original network name. |
| Phone Disposable | Enables you to detect whether a phone number is associated with a temporary or disposable phone service provider (e.g., freemsg.net, anonymsms.com) |
| IP Proxy Detection | Determines whether an IP address exhibits characteristics associated with anonymization or masking services, such as VPNs, proxies, relays, or Tor nodes. It also detects residential proxy traffic, a technique increasingly used in fraud operations. Residential IPs originate from legitimate consumer ISP ranges, making them harder to identify as risky |
| Phone Data Breaches | Provides information about known data breaches associated with a given phone number. It returns both a summary and detailed information on individual breaches, including dates, sources, and data linked to the phone owner such as name, emails, date of birth, and address. |
| Phone Portability | Provides detailed insights into the history and current status of a phone number as it moves between mobile network operators. Given a phone number, the API validates its format and returns whether the number has been ported, the original and current carrier names and network codes, and how many times the number has changed operator. |
| Phone to Name | Allows you to retrieve the most plausible name associated with a given phone number from an heterogeneous set of data sources including a level of confidence. |
| Trustfull Document | Coming soon |
| Trustfull Device | Coming soon |
Products by fraud type
This table outlines common fraud types across the user lifecycle and maps each use case to the Trustfull products best suited to detect and prevent them. It highlights how different fraud patterns emerge at signup, during account changes, at login, or through automated abuse and shows which signals and solutions are most effective at each stage.
| FRAUD TYPE/USE CASE | DESCRIPTION | PRODUCTS |
|---|---|---|
| Fake Identity Signups | Synthetic-identity fake signups occur when fraudsters create accounts using entirely manufactured identities, supported by fake or low-quality contact points (email, phone) and masked network infrastructure (VPNs, proxies, residential IPs). | Trustfull Onboarding, Trustfull Phone, Trustfull Email |
| Profile Update Fraud | Profile-update fraud happens when a user modifies key account attributes after signup (email, phone, or device) to either hide a synthetic identity, take over an account, or prepare it for downstream fraud. This phase is often more dangerous than signup, because the account already carries trust signals. | Trustfull Phone, Trustfull Email |
| Account Takeover | Account Takeover (ATO) is a type of fraud where an attacker gains unauthorized access to a legitimate user's account and then uses, modifies, or locks that account for financial gain, abuse, or further fraud. Unlike fake signups, ATO targets real users with real history and trust. | Trustfull Login |
| Bot Attack | A BOT attack is an automated attack where software programs (bots) simulate human behavior to interact with websites, apps, or APIs at scale. In fraud contexts, bots are used to abuse features faster, cheaper, and more consistently than humans. BOT attacks are often the engine behind large-scale fraud operations. | Trustfull Session |
| Account Sharing | Account sharing fraud occurs when multiple people intentionally use the same account, violating platform terms that restrict access to a single individual or household. While sometimes casual (e.g. password sharing), it becomes fraud when used to avoid paying, bypass limits, or resell access. | Trustfull Session, Trustfull Device |
| Promo Abuse | Promo abuse is a type of fraud where users exploit promotional offers such as signup bonuses, free credits, discounts, or referral rewards in ways not intended by the platform to gain unfair or repeated benefits. It is one of the most common and scalable fraud types, especially when combined with fake signups, bots, or synthetic identities. | Trustfull Onboarding |
| Refund Fraud | Refund fraud occurs when users abuse refund, return, or chargeback processes to obtain money, credits, or products without legitimately giving up value. It exploits the fact that refund systems are designed to favor customer trust and speed. Refund fraud can be intentional and organized, or opportunistic and repeated. | Trustfull Onboarding |
| OTP Abuse | OTP abuse is a type of fraud where attackers exploit One-Time Password (OTP) mechanisms, via SMS, email, or authenticator apps, to bypass security controls, test accounts, or harass users. OTPs are meant to protect accounts, but when abused, they become an attack surface. | Trustfull Phone, Phone Disposable, Phone Validation, Trustfull Session, Trustfull IP |
| Payment Fraud | Payment fraud occurs when a transaction is completed using unauthorized, manipulated, or abusive payment methods, causing financial loss to merchants, platforms, or financial institutions. It most commonly affects online and card-not-present (CNP) transactions, where the payer is not physically present. Payment fraud is often the end goal of other fraud types (fake signups, ATO, promo abuse). | Disposable Phone, Disposable Email, Trustfull IP, IP Proxy Detection |
| Fake Leads | Fake leads fraud occurs when non-genuine contacts are submitted through lead-generation channels (forms, ads, demos, trials) with no real intent to buy. These leads are created by bots, farms, competitors, or malicious actors to exploit incentives, drain budgets, or poison sales pipelines. Fake leads look legitimate on the surface but they never convert. | Trustfull Onboarding, Trustfull Session |
| Document Fraud | Document fraud occurs when forged, altered, stolen, or manipulated documents are used to misrepresent identity, eligibility, or legitimacy in order to gain access to services, accounts, funds, or benefits. It is a core enabler of identity-based fraud, especially in onboarding, KYC, lending, fintech, crypto, and high-risk marketplaces. | Trustfull Onboarding Trustfull Document |
| Age Verification Fraud | Age verification fraud occurs when users intentionally bypass or manipulate age checks to access age-restricted products, services, or content they are not legally or contractually allowed to use. It targets platforms where age gates are tied to legal compliance, safety, or monetization. | Phone to Name, Trustfull IP |
| Fake Merchant | Fake merchant fraud occurs when fraudsters create merchant or seller accounts that appear legitimate in order to process fraudulent transactions, launder money, or scam customers. These "merchants" are not real businesses, they are fronts designed to abuse payment systems and marketplaces. This fraud type targets merchant onboarding, KYB checks, and trust systems. | Trustfull Domain |
| Fake Reviews | Fake reviews fraud occurs when false, misleading, or manipulated reviews are posted to artificially inflate or damage ratings, rankings, and reputation on digital platforms. These reviews do not reflect genuine user experience and are created to influence decisions. Fake reviews directly attack the trust layer of marketplaces, apps, ecommerce, and SaaS platforms. | Trustfull Onboarding, Trustfull Session |
Updated 1 day ago