Next generation fraud detection

We help security and fraud teams more quickly discover, investigate and stop malicious activity.

Leading tech companies rely on Castle

Detect fraud faster with Castle

Account Opening

Reduce the number of fake and fraudulent accounts using Castle's identity-based risk signals. Works alongside existing KYC solutions to provide extra protection.

Account Takeover

Stop account takeover (ATO) using Castle's device fingerprinting, risk signals and configurable policies. Protect your users and your business from stolen credentials.

Transaction Fraud

Reduce transaction fraud by using Castle's identity-based risk signals to flag malicious activity. Works alongside other transaction fraud solutions to stop even more fraud.

Discover

Get visibility into
malicious user activity

Look at high level trends and spot patterns of abuse.

High level
analytics

Browse high-level activity metrics to keep an eye on attacks in progress or look for malicious activity.

Query user
activity

Drill into malicious activity. Uncover new attacks and create a plan for how to mitigate.

All user activity
in one place

User activity in Castle is enriched with IP address, UA, email, phone, and device fingerprint. In addition, risk score and risk signals are also included.

Investigate

Investigate security and
fraud incidents

View activity streams

See an activity stream for a single user, including when they sign up, login, and execute transactions. All activity is enriched by Castle, helping you identify when fraud occurs.

Spot fraud
more quickly

See every customer interaction enriched with Castle's data, including IP, UA, email, risk score, risk signals and more. Spot potential fraud faster than ever.

Uncover multiple
users per device

Find situations where multiple users are using the same device. Flag a device as bad to stop further logins.

Mitigate

Block or challenge
every malicious action

Adjust policies in real-time

Adjust policies in real-time to change what user actions to allow, challenge or deny. No need to wait for the development team to push code updates.

Assess risk automatically

Take advantage of Castle's machine learning trained risk models to automatically stop malicious bots and humans.

Edge and server protection

Stop more types of malicious activity by using Castle at the edge and at the server. Castle's SDKs support most common client and server side programming environments.

For Developers

Flexible building blocks

Decide what's important based on your specific needs. Our APIs are flexible, and easy to adopt.

Learn about our APIs
Request Submit payload to Castle's risk endpoint
Post api.castle.io/v1/risk
Payload here
Response Castle will return a risk analyzed response
{ 
  "risk": 0.83,
  "signals": {
    "bot_behavior": {},
    "proxy_ip": {},
    "disposable_email": {},
    "spoofed_device": {},
    "new_country": {}
    "multiple_accounts_per_device": {}
  },
  "policy": {
    "action": "challenge",
    "name": "Verify risky logins",
    "id": "e14c5a8d-c682-4a22-bbca-04fa6b98ad0c",
    "revision_id": "b5cf794e-88c0-426e-8276-037ba1e7ceca"
  },
  "device": {
    "token": "eyiOi1geyJhbJIUzI1geyJhbGcUacawiao0KQh"
  }
}
{ 
  "risk": 0.83,
  "signals": {
    "bot_behavior": {},
    "proxy_ip": {},
    "disposable_email": {},
    "spoofed_device": {},
    "new_country": {}
    "multiple_accounts_per_device": {}
  },
  "policy": {
    "action": "challenge",
    "name": "Verify risky logins",
    "id": "e14c5a8d-c682-4a22-bbca-04fa6b98ad0c",
    "revision_id": "b5cf794e-88c0-426e-8276-037ba1e7ceca"
  },
  "device": {
    "token": "eyiOi1geyJhbJIUzI1geyJhbGcUacawiao0KQh"
  }
}
{ 
  "risk": 0.83,
  "signals": {
    "bot_behavior": {},
    "proxy_ip": {},
    "disposable_email": {},
    "spoofed_device": {},
    "new_country": {}
    "multiple_accounts_per_device": {}
  },
  "policy": {
    "action": "challenge",
    "name": "Verify risky logins",
    "id": "e14c5a8d-c682-4a22-bbca-04fa6b98ad0c",
    "revision_id": "b5cf794e-88c0-426e-8276-037ba1e7ceca"
  },
  "device": {
    "token": "eyiOi1geyJhbJIUzI1geyJhbGcUacawiao0KQh"
  }
}
{ 
  "risk": 0.83,
  "signals": {
    "bot_behavior": {},
    "proxy_ip": {},
    "disposable_email": {},
    "spoofed_device": {},
    "new_country": {}
    "multiple_accounts_per_device": {}
  },
  "policy": {
    "action": "challenge",
    "name": "Verify risky logins",
    "id": "e14c5a8d-c682-4a22-bbca-04fa6b98ad0c",
    "revision_id": "b5cf794e-88c0-426e-8276-037ba1e7ceca"
  },
  "device": {
    "token": "eyiOi1geyJhbJIUzI1geyJhbGcUacawiao0KQh"
  }
}

Getting Started

Free trial

See for yourself all that Castle has to offer. No credit card required.

Sign up →

Pay-as-you-go pricing

Pay for Castle based on how many API calls you make.

See Pricing →

Easy to integrate

Integrate into your environment in as little as ten minutes.

Read docs →