How It Works:
- Create a list of high-risk values—this could include phone numbers, email addresses, device IDs, countries, or any specific data point you want to block or flag.
- Upload the list via the dashboard.
- Then the system flags against the list uploaded.
What You Can Flag
- Specific users (via email, phone number, or user ID)
- Countries or regions you do not want to onboard from
- Known fraud patterns tied to device fingerprints, IPs, etc.
- Repeat offenders or previously blocked identities