Deep Phone Check signals

List of the fraud checks we perform with our Deep Phone Check product.

🚧

Advice

We strongly advise reading our introduction to fraud prevention before seeking in-depth information on the specifications of our deep fraud checks.

📘

Important

An important part of our risk scoring mechanism for phone numbers is powered by ratio discrepancies between the behavior of real and safe phone numbers VS disposable and risky phone numbers.

We generate discrepancy ratios by analyzing hundreds of thousands of phone numbers from numerous disposable phone number websites and legitimate databases.

To understand the ground-breaking technicalities that power our risk assessment logic for phone numbers, we invite you to read our multiple technical white papers.

Here is the up-to-date overview of all the phone fraud checks we perform to uncover risk & trust signals:

  • Phone Disposable check (code: PHONE_DISPOSABLE)
    • This check goes above and beyond to detect if the phone number is present on any disposable & temporary phone websites by consistently crawling hundreds of disposable phone number websites and storing the data we found.
    • Risk outcome example: Phone number is disposable and was found on: https://sms-activate.org/en/44798512454, https://smsreceivefree.com/44798512454
    • Trust outcome example: This phone number was not found on any free temporary/disposable SMS services
  • Phone Carrier check (code: PHONE_CARRIER)
    • This check performs a deep scan to verify the carrier of the phone number. We do not simply rely on blacklisting VOIP carriers. We also flag risky mobile carriers usually found on SMS verification bypass services (such as cheap prepaid SIM carriers that are prominent on the black market but rarely associated with legitimate customers). We also check if the carrier is one of the main mobile carrier in its country, or an unusual small/unknown carrier. Learn more about our carrier scoring here.
    • Risk outcome example: The carrier Lycamobile was blacklisted by our system as it is mostly used by fraudsters. It is not one of the main mobile carriers in France (FR): Bouygues Telecom, Free, Orange France, SFR
    • Trust outcome example: The carrier SFR is one of the main mobile carriers in France (FR): Bouygues Telecom, Free, Orange France, SFR
  • Phone Is Blacklisted check (code: PHONE_IS_BLACKLISTED)
    • This check leverages OSINT to see if a phone number has been blacklisted (banned) by 3rd party services such as social media websites. Many fraudsters share the same disposable phone number to create fake accounts on various platforms. When a fake profile gets caught and blacklisted by for example Twitter, Instagram or any other major social, we gather that new intelligence to flag the phone number as risky. This is a very effective test against any sort of disposable phone number.
    • Risk outcome example: This phone was blacklisted by various social media, indicating an extreme risk of fradulent activity
    • Trust outcome example: This phone was not blacklisted by any 3rd party services
  • Phone OS check (code: PHONE_OS)
    • This check leverages exclusive intelligence to identify the device behind a phone number. Significant discrepancies are found between the OS of fraudulent VS legitimate phone numbers. For example, IOS devices are very trustworthy, while if no OS is found, it can indicate that the phone number is coming from a SIM farm or an unsafe device. Learn more here.
    • Risk outcome example: No devices were linked to this phone number, which is highly unusual for phone numbers from Germany (DE).
    • Trust outcome example: This phone number is live on an iOS device.
  • Phone Data Breach check (code: PHONE_DATA_BREACH)
    • This check searches through all existing data breaches to see if the phone number was involved in a data breach. It is fairly uncommon for a phone number to be associated with data breaches, so no risk signals are derived from this check. However, a phone that was breached is considered much safer than usual, as it indicates it was in use long enough and was not freshly activated. Note that we source our data for this check from Have I Been Pwned.
    • No risk signals are derived from this check.
    • Trust outcome example: This phone number was involved in the data breach 'Facebook 2017' 5 years ago.
  • Phone Type check (code: PHONE_TYPE)
    • This check leverages various HLR data sources to analyze the type of a phone number (VOIP, MOBILE, LANDLINE...), and flags suspicious phone types such as VOIP.
    • Risk outcome example: This phone number type is 'VOIP'.
    • Trust outcome example: This phone number type is 'MOBILE'.
  • Phone Consistency check (code: PHONE_CONSISTENCY)
    • This check analyze the online profiles we found linked to the phone number and cross-check every bit of information we found (pictures, name, location, etc) to see if it is consistent. For example, if a phone number is found to be named 'Livia' on its 'Viber' profile, but named 'Fred' on 'Telegram', and '典- 汉字' on 'LINE', this is a risk signal. Those discrepancies are common among shared fake phone numbers. However, if the phone number is found to be linked to a Skype profile named 'Thomas' and a Telegram profile named 'Thomas', this would be considered a very strong trust signal. Learn more here.
    • Risk outcome example: This phone number's online profiles are not consistent: Telegram first_name is 'Алексей' in Cyrillic, LINE name is '艺涵' in Chinese.
    • Trust outcome example: This phone number's online profiles are consistent: Skype username is 'thomas78', Airbnb name is 'Thomas', Facebook first_name is 'Thomas'. The Skype country is Netherlands (NL), matching with the Airbnb country Netherlands (NL).
  • Phone Blackmarket Presence check (code: PHONE_BLACKMARKET_PRESENCE)
    • This check analyze on which online services the phone number is registered. Major discrepancies are found between a fraudulent and legitimate phone numbers' social presence. A common mistake fraud managers make is to believe that a phone number linked to various social profiles is a safe attribute. However, this approach is inaccurate and can lead to many disposable phone numbers being undetected. We crafted a holistic and powerful system that analyzes the kind of service a phone is registered on to uncover temporary phone numbers. For example, a French phone number with a VKontakte and KakaoTalk profile is a highly suspicious pattern that is very rarely seen in real life, but very common among phone numbers sold on SMS verification bypass websites. This high impact check uncovers deep fraud patterns like no other solution. Read our technical white paper here.
    • Risk outcome example: This phone number is registered on VKontakte, KakaoTalk, which is highly unusual for a France (FR) number. The chance of this number not being fraudulent is 155748 to 1.
    • Trust outcome example: This phone number is registered on services Google, Instagram, Microsoft which is very common among legitimate France (FR) phone numbers.
  • Phone Blackmarket Pattern check (code: PHONE_BLACKMARKET_PATTERN)
    • This check leverages check the social information about a phone number, such as the Telegram username, the Viber last_seen property, and dozens other social media indicators. Significant discrepancies are found between fraudulent and legitimate phone numbers' social attributes. We analyzed millions of fraudulent phone numbers and uncovered significant systemic patterns linked to disposable phone numbers. For example, a phone number linked to a Telegram profile named 'Helpdesk Bitcoin' is a very high-risk signal, as it shows those phone numbers are linked to cryptocurrency scams on Telegram. Another example would be a phone number linked to a WhatsApp business account named 'Escort Service': this would indicate a very risky phone number involved in romance scams. Read our technical white paper here.
    • Risk outcome example: This phone number is linked to a Telegram account named 'Escort Hire Premium'. The word 'Escort' is blacklisted as it is always associated with fraud.
    • Trust outcome example: No black-market patterns were present on the online profiles of this phone number