Digital footprint checks
Use digital footprint signals to assess applicant risk before verification.
Digital footprint checks help you assess applicant risk before identity verification starts. The checks analyze contact data, such as email addresses and phone numbers, and return early risk signals during sign-up and other pre-KYC flows.
This early signal layer helps you identify potentially risky users before document verification. You can use it to block clearly high-risk applicants, route applicants to a different verification flow, trigger step-up checks, or send cases to manual review.
Digital footprint checks help detect early signs of:
- Fake and synthetic identities
- Identity takeover attempts
- Anonymity-seeking behavior
- Accounts created for resale or transfer
- Drop accounts and money mule activity
- Verification scams and social engineering
The solution includes three components:
- Email risk assessment — evaluates risk signals related to an email address.
- Phone risk assessment — evaluates risk signals related to a phone number.
- Identity enrichment — provides additional context and connections related to these identifiers.
Together, they help you evaluate how trustworthy a digital identity looks before actual verification begins.
Email addresses and phone numbers do not only provide contact details. They also reflect how a user created, used, and connected those identifiers over time. That history gives you a useful risk context early in the user journey.
For example, an email address can show whether it looks disposable or was created for one-time use. A phone number can show whether it belongs to an actual mobile user or to a virtual number that someone can generate at scale.
These identifiers also carry usage signals:
- Long-term, consistent activity usually points to a more established digital identity.
- A new, sparse, or fragmented footprint often increases risk, especially when it appears together with other suspicious signals.
Consistency makes these checks much more useful. A phone country that does not match the user’s IP location, or contact data that does not align with identity data from documents, can point to identity theft, synthetic identities, or other fraud patterns.
NoteA weak digital footprint does not prove fraud on its own. A legitimate user may have limited online history, may use a recently issued number, or may deliberately keep a low digital profile. For that reason, digital footprint checks work best when you combine them with other risk signals rather than treat them as a standalone decision source.
How digital footprint checks work
Digital Footprint Checks combine signals from global data sources into a unified risk assessment.
Basic (structural) signals
At the most basic level, the checks look at the core properties of an email address or phone number:
- For email, this includes domain type, validity, and deliverability.
- For phone numbers, this includes number type, carrier, and country.
These signals help detect straightforward fraud patterns, such as disposable emails or virtual phone numbers created in bulk.
Digital presence signals
The checks also evaluate digital presence. This helps you understand whether:
- Identifier has an established footprint across platforms.
- It shows signs of continued use over time.
A stronger footprint usually suggests long-term use, while a weak or missing footprint can point to a newly created or synthetic identity.
Identity enrichment signals
Identity enrichment signals add more context by linking an email address or phone number to other publicly available or historically observed data. This can include:
- Possible names
- Related identity signals
- Historical usage patterns.
That context helps you judge whether the identifier behaves like part of a real identity.
TipThe checks become even more useful when you compare these results with other applicant data.
For example, if the phone country does not match the user IP-based location, or if the contact data does not align with the identity information collected later in the flow, the mismatch may indicate fraud. In practice, these consistency checks often provide stronger signals than any single attribute on its own.
What data checks return
Digital Footprint Checks return both raw data and an aggregated risk score.
The raw output includes detailed signals and attributes from email, phone, and enrichment checks. You can use this data to create custom rules, decision logic, or internal scoring models.
The aggregated output combines multiple signals into a single risk indicator. This makes decisioning easier when you need a faster and more standardized way to assess risk. You can use this score directly or combine it with other risk inputs in your own model.
How we calculate email and phone risk level
The risk calculation for a phone number and email address is based on several checks that help to assess whether they are trustworthy or potentially suspicious. Each factor contributes to an overall risk level that indicates whether the phone number or email address is safe, medium-risk, or high-risk.