Skip to main content

Device Fingerprinting

On this page
Prerequisites

Before implementing device fingerprinting, ensure you understand:

  • Risk scoring concepts (fingerprinting feeds into scores)
  • Velocity rules (fingerprinting enables device-based velocity)
  • Privacy compliance requirements (GDPR, CCPA)
  • Account takeover patterns you're trying to detect
TL;DR
  • Device fingerprinting has evolved into device intelligence: hundreds of signals across hardware, browser, network, behavior, and sensor data
  • Modern platforms can detect VPNs, emulators, phone farms, remote desktop tools, and anti-detect browsers
  • Signals like battery state, gyroscope data, TLS fingerprints, and typing cadence reveal things transaction data alone cannot
  • Vendors range from consortium-scale networks (ThreatMetrix, Iovation) to deep behavioral analytics (Sardine) to fully managed decisions (Forter)
  • No single signal is definitive. The power comes from cross-layer correlation: transport + device + browser + behavior

Device fingerprinting started as a way to assign a unique ID to a browser. Modern device intelligence goes far deeper, collecting hundreds of signals across hardware, software, network, and behavior to answer questions like: Is this a real device? Is a real person using it? Have we seen this device before? Is someone controlling it remotely?

This page covers what signals exist, what they reveal, and which vendors offer what. For how to use device signals in fraud rules, see Building Fraud Rules.


How It Works

Fingerprint Types

TypeHow It WorksPersistenceEvasion Difficulty
Cookie-basedStores a token in the browserLow (cleared easily)Trivial
Browser fingerprintHashes browser attributes (user agent, plugins, fonts)Medium (changes with updates)Moderate
Device fingerprintCombines hardware signals (GPU, CPU, screen, sensors)High (survives browser changes)Hard
Probabilistic/fuzzyUses ML to match devices even when some attributes changeHigh (survives cookie clearing, incognito)Very hard
BehavioralLearns how a specific person uses a device (typing, movement)Medium-High (builds over sessions)Very hard to replicate

Modern vendors combine multiple types. A good device intelligence platform doesn't rely on any single fingerprint. It cross-references all layers so that spoofing one signal creates inconsistencies in others.


Signal Categories

Device intelligence platforms collect signals across seven categories. No single category is decisive on its own. Fraud detection comes from inconsistencies between categories.

1. Browser and App Signals

The traditional fingerprinting layer. Still useful, but easily spoofed in isolation.

SignalWhat It RevealsFraud Relevance
Canvas fingerprintHash of rendered 2D graphics (varies by GPU, driver, OS)Matches known emulator/headless signatures
WebGL fingerprintGPU vendor and renderer string, 3D rendering outputGoogle SwiftShader = software GPU (headless/emulator). VirtualBox Graphics Adapter = VM
Audio fingerprintAudio processing output unique to hardware/OS stackAbsent in headless browsers, identical across emulator instances
Font enumerationInstalled font listWindows device claiming Linux fonts = spoofed user agent
Navigator propertiesPlugins, languages, hardware concurrency, device memorynavigator.webdriver === true = automation (Selenium, Puppeteer)
User agentBrowser and OS identificationEasily spoofed, but inconsistencies with other signals are revealing
Anti-Detect Browsers

Tools like Multilogin, GoLogin, and Dolphin Anty spoof all of these signals to make each browser profile look unique. They're widely used in fraud operations. Modern device intelligence platforms detect anti-detect browsers by looking for inconsistencies between spoofed browser attributes and harder-to-fake signals like TLS fingerprints, sensor data, and behavioral patterns.

Looking for Basic IP Enrichment?

For server-side IP lookups via API (geolocation, VPN detection, datacenter detection) with no SDK required, see Data Enrichment. This section covers deeper network signals that require a client-side SDK - WebRTC leak detection, TLS fingerprinting, and residential proxy detection via device correlation.

2. True IP and Network Intelligence

IP addresses are the most spoofed signal in fraud. Modern platforms go beyond the visible IP to find the real one.

TechniqueHow It WorksWhat It Catches
WebRTC leak detectionCreates a hidden peer connection via STUN servers. UDP traffic can bypass VPN tunnels, revealing the real IPVPN users whose real IP leaks through WebRTC
TLS fingerprinting (JA3/JA4)Hashes the TLS ClientHello message (cipher suites, extensions). Each TLS client has a unique signatureUser agent says "Chrome" but TLS fingerprint matches Python requests library = bot
ASN/datacenter detectionMaps IP to owning organization. Classifies as residential, mobile, datacenter, or hostingDatacenter IPs are 20-50x more likely to be fraud than residential
Residential proxy detectionCorrelates IP rotation patterns with stable device fingerprintsIP changes every request but device fingerprint stays constant = rotating residential proxy
Timezone vs. IP mismatchCompares browser timezone (Intl.DateTimeFormat) with IP geolocationIP in London, timezone set to America/Los_Angeles = VPN user who forgot to change timezone

Several vendors offer "True IP" technology that attempts to reveal the actual IP behind VPNs and proxies. ThreatMetrix pioneered this approach with their TrueIP feature, and Sardine offers similar "True Piercing" technology (TrueIP, TrueOS, TrueLocation). The accuracy varies by technique and how the VPN is configured.

IP classification matters as much as the IP itself:

IP TypeExample OwnerRisk Level
ResidentialComcast, AT&T, BTLow (expected for consumers)
Mobile/CellularT-Mobile, VodafoneLow (expected for mobile)
Datacenter/HostingAWS, DigitalOcean, OVHHigh (real consumers don't browse from datacenters)
Known VPN providerNordVPN, ExpressVPN rangesMedium-High
Known proxy serviceBright Data, OxylabsHigh
Tor exit nodePublished exit node listsVery High

3. Device Integrity

These signals detect whether the device itself has been tampered with, emulated, or is being controlled remotely.

SignalNormal DeviceFraud Indicator
Emulator detectionReal hardware identifiers (e.g., samsung/...)Generic build strings (goldfish, ranchu, sdk_gphone), SwiftShader GPU, missing sensors
Root/jailbreakStock OS, normal permissionsPresence of su binary, Cydia/Magisk, SELinux permissive, writable system partition
Remote desktopNo remote access software activeTeamViewer, AnyDesk, Windows RDP, Zoom screen sharing detected
VM detectionReal GPU, normal CPUVirtualBox/VMware graphics adapters, low CPU core count, VM-specific BIOS strings
Developer toolsnavigator.webdriver is falsenavigator.webdriver === true, empty plugins array, CDP connection active
Frida/instrumentationNo runtime hooksFrida toolkit detected (commonly used to bypass security checks and manipulate API responses)
Remote Desktop Detection Matters

Remote access scams are growing. A fraudster calls a victim, convinces them to install TeamViewer, then controls their device to make transactions. The transaction comes from the victim's real device and real IP, so traditional signals look clean. Detecting active remote desktop software is one of the few ways to catch this pattern.

4. Behavioral Biometrics

How someone uses a device is extremely difficult to fake at scale. This is where the newest and most powerful signals come from.

Typing and keystroke dynamics:

SignalWhat It MeasuresWhat Fraud Looks Like
Typing speedCharacters per second, words per minutePerfectly uniform timing = bot/automation
Dwell timeHow long each key is heldZero variance = programmatic key injection
Flight timeGap between releasing one key and pressing the nextIdentical intervals = scripted input
Segmented typingTyping in bursts with pauses (switching to reference material)Typing name/address in fragments while looking at a stolen data sheet
Copy-paste in identity fieldsWhether name, SSN, or address was pasted vs. typedLegitimate users type their own name from memory. Pasting it is a strong fraud signal

Mouse and pointer behavior:

SignalWhat It MeasuresWhat Fraud Looks Like
Movement trajectoriesCursor path between targetsPerfectly straight lines = simplest bot. Geometric patterns = scripted
Micro-movementsTiny jitter when cursor is "still"Zero jitter = bot. Humans always have hand tremor
Click patternsTiming, location, frequencyUniform click intervals = automation
Scroll behaviorSpeed, direction, pausesUniform scroll with no pauses = bot
Guided movementCursor controlled by someone else (latency artifacts)Remote access tool in use

Mobile sensor data:

SignalWhat It MeasuresWhat Fraud Looks Like
GyroscopeDevice orientation and rotationZero readings = emulator (no physical sensors) or phone farm device sitting on a rack
AccelerometerMovement and vibrationPerfectly static = not being held by a human
Touch pressureForce of finger on screenUniform pressure = automation. No pressure data = emulator
Device orientationHow the phone is heldStatic at ~90 degrees = propped up on a rack, not in someone's hand

5. Battery and Power Signals

A small but revealing signal category. Available through the Battery Status API (web) and native mobile SDKs.

SignalNormal UserFraud Indicator
Always at 100%, always chargingBattery fluctuates throughout the dayPhone farm: devices permanently plugged into USB hubs
Battery level never changes across sessionsVaries naturallyEmulator (many report a static level like 0.50 or 1.00)
Inconsistent battery between "same user" sessionsConsistent within short timeframesAccount sharing or credential selling

Battery data alone is a weak signal. Its value is corroborative: a device that's always charging AND has zero gyroscope movement AND has been seen on 50 accounts is almost certainly a phone farm device.

6. Phone Farm and Fraud Factory Detection

Phone farms are physical or virtual collections of devices operated at scale to simulate independent users. No single signal catches them. The detection comes from a composite profile.

SignalWhat a Farm Device Looks Like
BatteryAlways at 100%, always charging (plugged into USB hubs)
Gyroscope/accelerometerZero movement (mounted on rack, not held by a human)
Device attributesSame hardware fingerprint appearing across many "different" accounts
Factory resetsFrequent resets (every few hours/days) to create "fresh" identities
Device ID cyclingIMEI, Android ID, or advertising ID changes on the same hardware
Network patternsMany devices sharing the same IP range or cycling through a small pool
Behavioral uniformityAll devices show identical interaction patterns, timing, and session flow
No natural idle periodsLegitimate users sleep. Farm devices may operate 24/7
Physical proximityDozens of "independent" devices co-located in the same physical space

7. Consortium and Reputation Data

The most powerful device intelligence signal is often the simplest: has this device been seen committing fraud before?

Consortium networks pool device reputation data across thousands of merchants. When a device is flagged as fraudulent at one merchant, every other merchant in the network sees that signal in real time.

What Consortium Data Tells YouExample
Device has been involved in fraud beforeDevice flagged for chargebacks at 3 other merchants in the past 90 days
Device is brand new to the networkNever seen before, no history (higher risk for new accounts)
Device has long trusted historyFirst seen 2 years ago, clean history across 12 merchants (strong trust signal)
Device is linked to known fraud ringsSame device cluster seen in coordinated attacks across the network

How Signals Work Together

No single signal is definitive. The power of device intelligence comes from layering and cross-referencing signals across categories. Inconsistencies between layers are the strongest indicators.

Example: Catching an anti-detect browser

An anti-detect browser can spoof canvas fingerprint, WebGL renderer, user agent, timezone, and language. But:

  • The TLS fingerprint (JA3/JA4) still matches the underlying Chromium build, not the spoofed user agent
  • The battery API reports a static level (emulated environment)
  • Typing patterns don't match the account's historical behavior
  • The IP is residential, but the ASN belongs to a known residential proxy provider

Any one of these signals alone might be explainable. All four together are not.

Example: Detecting a remote access scam

The transaction comes from the victim's real device, real IP, real location. Traditional signals look clean. But:

  • Remote desktop software (TeamViewer) is active
  • Mouse movements show latency artifacts consistent with remote control
  • The user is on an active phone call during the session
  • Typing patterns show hesitation and segmented entry (victim being coached)

Vendor Landscape

Device intelligence vendors vary significantly in what signals they collect, how large their consortium networks are, and how they deliver decisions. The table below compares vendors on capabilities, not marketing claims.

Comparison by Capability

CapabilitySardineThreatMetrixIovationKountSiftForter
Behavioral biometricsDeep (typing, mouse, sensors, copy-paste, active calls)Yes (BehavioSec integration)LimitedLimitedBasicYes (6,000 attributes)
True IP / proxy piercingYes (True Piercing)Yes (TrueIP, pioneer)Basic proxy detectionBasic proxy flagBasicYes
Emulator detectionYes + TrueOSYesYesYes (PC_REMOTE flag)YesYes
Remote desktop detectionYes (92% precision, protocol-agnostic)LimitedLimitedPC_REMOTE flagLimitedLimited
Phone farm detectionYes (sensor + behavioral composite)Via consortiumVia device reputationVia velocityVia velocityVia identity graph
TLS fingerprintingYesYesLimitedLimitedLimitedYes
Anti-detect browser detectionYesYesLimitedLimitedLimitedYes
Consortium network scaleGrowing1.4B identities, 110M daily decisions5B devices, 185M fraud reports17.5B devices (Equifax network)1T+ events/year1.2B identities
Custom rule engineYes (4,000+ features)Yes (60+ assertions)Yes (business rules)Yes (policies + UDFs)Yes (Workflows)No (fully managed)
Credit bureau dataNoNoNoYes (Equifax)NoNo
Chargeback guaranteeNoNoNoNoNoYes

Choosing a Vendor

The right vendor depends on your biggest problem, not the longest feature list.

If Your Primary Problem Is...Look At
Sophisticated fraud bypassing basic rules (anti-detect browsers, residential proxies, emulators)Sardine, ThreatMetrix - deepest signal collection and cross-layer correlation
Needing device reputation at scale (has this device been seen in fraud before?)ThreatMetrix (1.4B identities), Iovation (6B+ devices) - largest consortium networks
Remote access / social engineering scamsSardine - only vendor with protocol-agnostic remote desktop detection at reported 92% precision
Identity verification + device signals (synthetic identity, application fraud)Kount/Equifax - unique credit bureau integration alongside device fingerprinting
Multi-abuse-type detection (payment fraud + promo abuse + content abuse + ATO)Sift - independent scores for 5 abuse types, ThreatClusters for industry-specific models
Not wanting to manage rules at all (fully outsourced decisions with financial guarantee)Forter - managed decisions with 100% chargeback guarantee on approved transactions
Budget-conscious / just getting startedFingerprint Pro (device ID focused, lower cost), or your processor's built-in tools (Stripe Radar, Adyen RevenueProtect)

Pricing and Accessibility

VendorEntry PriceFree Tier?Self-Serve?Primary Use Case
FingerprintFrom $99/month (100K identifications)Yes - 20,000 identifications/monthYesDevice identification, returning visitor recognition
SEONFrom $599/month (5K+ API calls)Yes - 100 API calls/monthYesSocial profiling + email/phone enrichment + device signals
ThreatMetrix (LexisNexis)Enterprise quotes onlyNoNoLarge enterprise device intelligence, consortium reputation
BioCatchEnterprise quotes onlyNoNoBehavioral biometrics for banks, social engineering detection
NeuroIDEnterprise quotes onlyNoNoForm interaction analytics, application fraud detection
Iovation (TransUnion)Enterprise quotes onlyNoNoDevice reputation + credit bureau integration
SardineEnterprise quotes onlyNoNoDeep behavioral biometrics, True IP piercing, remote desktop detection

Budget-conscious? Fingerprint is the only device fingerprinting vendor with a meaningful free tier and self-serve onboarding. At $99/month for 100K identifications, it's accessible to most SMBs. SEON bundles device signals with email/phone enrichment starting at $599/month but is really a lightweight fraud platform, not a pure device fingerprinting tool.

Enterprise? ThreatMetrix, BioCatch, Iovation, and Sardine require sales conversations and annual contracts. If you're under $2M in annual volume, these vendors likely aren't a fit - start with Fingerprint or your processor's built-in tools (Stripe Radar, Adyen RevenueProtect).

Processor Tools vs. Standalone Vendors

If you use Stripe Radar or Adyen RevenueProtect, you already have basic device fingerprinting, IP intelligence, and ML scoring included. Standalone device intelligence vendors add deeper signals (behavioral biometrics, sensor data, True IP, consortium reputation) that processor tools don't collect. Whether you need a standalone vendor depends on your fraud sophistication and volume. See Processor Rules Configuration for what's included with each processor.


Use Cases

Fraud Detection

Use CaseHow Device Intelligence Helps
Card testingSame device cycling through hundreds of card numbers = single fraud source
Multi-accounting / promo abuseSame device fingerprint across multiple "different" accounts
Account takeoverNew device + new location + new behavioral pattern on existing account
Fraud ring linkageCluster of devices with shared attributes, same IP ranges, same behavioral patterns
Application fraudEmulator detected, copy-paste in identity fields, no sensor data
Remote access scamsActive remote desktop software, mouse latency artifacts, active phone call

Account Security and Trust

Use CaseHow Device Intelligence Helps
Step-up authenticationTrigger MFA on unknown device (see 3DS)
Trusted device recognitionReturning device with clean history = lower friction
Session managementLimit active devices per account
Compelling evidenceDevice fingerprint matching for Visa CE 3.0 chargeback representment

Implementation Approaches

Build vs. Buy

ApproachWhat You GetWhat You Don't Get
In-house (FingerprintJS open source)Basic device fingerprinting, full control, no data sharingNo consortium data, no behavioral biometrics, no True IP
Device ID vendor (Fingerprint Pro)Stable device IDs, basic bot detection, good accuracyLimited behavioral signals, smaller consortium
Full platform (Sardine, ThreatMetrix, Sift, etc.)Deep signals, behavioral biometrics, consortium, rules engineHigher cost, data sharing requirements, vendor dependency
Processor-included (Stripe Radar, Adyen)Basic fingerprinting + ML scoring included in processing feesBlack-box scoring, limited device signal visibility, no cross-merchant reputation

See vendor selection guide for evaluation criteria.

What to Ask a Vendor

When evaluating device intelligence vendors, ask:

  1. What signals do you collect beyond basic fingerprinting? (Behavioral biometrics, sensor data, TLS fingerprints)
  2. How do you handle anti-detect browsers and residential proxies? (Cross-layer correlation, not just database lookups)
  3. How large is your consortium network, and is it relevant to my vertical? (A billion devices is useless if none are in your industry)
  4. Can I write custom rules against your signals, or are decisions fully managed?
  5. What's the latency? (Sub-100ms is the standard for real-time decisioning)
  6. How do you handle privacy compliance? (Data tokenization, consent management, GDPR readiness)

Privacy Considerations

Compliance Required

Device fingerprinting may be subject to:

  • GDPR (consent requirements, legitimate interest basis)
  • CCPA (disclosure requirements)
  • ePrivacy Directive
  • Local regulations

Consult legal before implementation. See compliance overview for related requirements.

Best Practices

  1. Transparency - Disclose device fingerprinting in your privacy policy
  2. Purpose limitation - Use only for fraud prevention and security
  3. Data minimization - Collect only what's needed for fraud detection
  4. Retention limits - Set expiration on device profiles (consortium data may have its own retention)
  5. Consent where required - Cookie banners, opt-in where legally necessary
  6. Vendor data sharing - Understand what data your vendor shares across its consortium and under what terms

Next Steps

Just getting started?

  1. Use your processor's built-in device fingerprinting first (Stripe Radar, Adyen RevenueProtect)
  2. Build velocity rules using device ID as a dimension
  3. Review privacy requirements before adding standalone tools

Adding standalone device intelligence?

  1. Choose a vendor based on your primary fraud problem
  2. Integrate and run in shadow mode alongside your existing tools for 30 days
  3. Compare the new signals against your current fraud catches and false positives

Already have device intelligence?

  1. Use device signals in fraud rules
  2. Build behavioral patterns into your review process
  3. Prepare device data for CE 3.0 chargeback representment