Holistic device intelligence
Stop any abuse using device fingerprinting, risk scoring, and a real-time rules engine – all through a single API.
- $100 per 100k API calls
- 30-day free trial
- SOC 2 Type II & GDPR

- Device fingerprintmXmHRNq8Rg@5JGSm6
- TriggerDenyBlock multi-accounting
- ActionAdd toBlocked Users
- ActionNotify #security-alerts

Device fingerprinting
and much, much more
Blazing fast device identification, designed for scale. 30 day trial at $100/mo per 100k API calls.
|
|
Built for scale
Our APIs handle billions of requests monthly, resilient against intense bot attacks.
100ms response time
Fingerprinting, risk scores, and rules computed instantly in real-time.
$100 per 100k calls
Best industry pricing; upgrade options available with no additional code
Categorize bad actors based on behavior
Use a combination of device fingerprinting, risk scoring, custom velocity aggregations, and dynamic blocklists to define behaviors unique to your specific abuse vectors.
Weed out bad actors before or after signup
Segment out new accounts based on similarity to other accounts, bot behavior, and blocklists.
More about Fake Accounts- Suspicious IP
- Users per Device (12)
- Repetitive Email Pattern
- Abuse-repored IP
- Suspicious IP
- Blocked Country
Identify both bots and human attacks
Use a combination of scores and heuristics to highlight suspicious or hijacked accounts.
More about Account Takeovers- Credential Stuffing
- New Device
- Datacenter IP
- Abuse-repored IP
- New Device
- New Country
- Impossible Travel
- Proxy IP
- Users per Device (2)
Only allow signing up once
Aggregate the number of accounts created per device, IP, or credit card and block when it exceeds a threshold.
More about Multi-Accounting- Users per Device (13)
- Users per Credit Card (7)
- Users per IP (32)
- Users per Device (12)
- Users per Credit Card (6)
- Users per IP (31)
- Users per Email (3)
Block repetitive spam content
Customize logic based on the the number of content posts or messages per device and minute, and tune it with regex filters.
More about Content Abuse- Bot Behavior
- Content per IP (122)
- Datacenter IP
- Content per User 1h (33)
- Proxy IP
- Blocked Regex
Eliminate SMS verification abuse
Use a mix of bot detection and velocity signals to lock down spammy SMS fees with high precision
More about SMS Pumping- Bot Behavior
- Verifications per IP (48)
- Users per Device (12)
- Bot Behavior
- Verifications per IP (48)
- Blocked Phone Numbers
Define account sharing your way
Uncovering account sharing requires granular controls to define the exact behavior that breaches your terms of services.
More about Account Sharing- Excessive Content Sharing
- Impossible Travel
- Frequent Device Toggling
- Bot Behavior
- Proxy IP
- Frequent IP Toggling
- Impossible Travel
Stop card testing before the transaction
Implement velocity checks to prevent a transaction attempt from reaching your payment processor in the first place.
More about Transaction Abuse- Transactions per 1h (13)
- Transactions per Card (21)
- Users per Device (3)
- Transactions per 10m (5)
- Blocked Credit Card
Headless API protection
Castle supports protection of endpoints where client-side code can't be injected, such as desktop apps or REST APIs
More about API Abuse- Request per IP (138)
- Abuse-reported IP
- Time Since Registration (39s)
- Request per User (18)
- Blocked IP
Trigger actions in real-time
Assessments of data like user count per device fingerprint or hourly failed logins executed in the blink of an eye.
Real-time decisions
Assessments of data like user count per device or hourly failed logins executed in the blink of an eye.
Inline blocking
Initiate request blocks or step-up verifications anywhere in your app without disrupting the user experience.
Alerts & notifications
Ensure your team and users stay informed with triggered Slack notifications or webhooks.

Holistic view of user activity
Spot network of bad user activity via shared device fingerprints, emails, IPs, payment methods, or addresses.
Pattern exploration
Uncover bad user activity by querying and visualizing large amounts data and turn into rules with a few clicks.
Network analysis
Spot network of bad user activity via shared devices, emails, IPs, payment methods, or addresses.
Session monitoring
Get a complete history of each user and company, down to individual page views and any custom actions.
Rule backtesting
Test complex risk logic on historical data first, ensuring zero disruption to legitimate users.
Pattern exploration
Uncover patterns in on login attacks, signup spam campaigns, and repetitive in-app transactions.

Network analysis
Spot interconnected users via shared devices, emails, IPs, payment methods, or addresses.

Session monitoring
Get a complete history of each user and company, down to individual page views and any custom actions.

Rule backtesting
Test complex risk logic on historical data first, ensuring zero disruption to legitimate users.
