Demyst: Fraud Risk – Premium Data Collection
Use this recipe to conduct an assessment of fraud risk about an incoming transaction with your services.
Use this recipe to conduct an assessment of fraud risk about an incoming transaction with your services. When using this recipe, you would input the information you have about the other party in the transaction including name, residential address, IP address, phone number and email address, and it would return details about each that you can use to make an assessment of the riskiness of the party. For example you may notice that the other party has only just created their supplied email, and their phone number is registered in a different country to where they’re saying they are, and so you can now deny the incoming transaction and flag it for investigation. This recipe utilises Maxmind to provide details about the IP address associated with the transaction and Ekata to provide details about name, IP address, residential address, email and phone. When using this recipe, input as many details as you have available, including at least one of ip4 or ip6.
User shares data with Demyst.
Demyst enriches data.
Demyst shares data back to user through Snowflake data share.