Fraud Labs Pro Fraud Detection and Fraud Detection Solutions: What is ISP usage type validation?

From an IP address, you can find out where the IP address is coming from, whether it’s from a fixed line, a mobile line, a military IP and so on. This is what we referred as ISP usage type in our fraud verification system. This information plays an important fraud indicator in telling you if any phishing activity behind the scene. For example, if you found out an IP address coming from Data Center/Web Hosting/Transit, chances are they may not be a legitimate buyers. You may want to flag this order for fraud review and manually calling them for further authentication.

What are the ISP usage types supported?

  • Commercial
  • Organization
  • Government
  • Military
  • University/College/School
  • Library
  • Content Delivery Network
  • Fixed Line
  • Mobile Line
  • Data center/Web Hosting/Transit
  • Search Engine Spider

Below are the steps on how to configure the usage type validation

1. Login to the FraudLabs Pro Merchant Control Panel.

2. Click on the Rules then click Add Rule.

add fraud validation rule

3. Select ISP Usage Type below the IP Validation

IP Validation

4. Select the Condition.

configure fraud rules - ISP type validation

5. Select the ISP that you wish to validate.

configure fraud rules - ISP type validation

6. Choose the action you want.

configure fraud rules - ISP type validation

7. Click Add Rule and don’t forget to click Save and you are done.

Advertisements

We Tested 50+ Free Security Tools so You can Use Them for Your Online Protection

Heimdal Online Security – The idea that we should create a gargantuan list of cyber security tools started to spring in our minds around the beginning of this year.

We started from a simple idea: It should be useful. We need it. You need it. It will come in handy in the future, to have all those tools in one place.

In our journey into the cyber security and data protection world, we ran into lots of useful tools. Some of them were unmarketed gems that we had no idea that they even existed. We ran into most of them completely by mistake, while searching for something else (usually on Quora or randomly navigating on blogs).

When we finally decided to do it, to work on the list, we had no idea how and where to begin.

What tools should we include? What should we not? How do we tell if one is worthy and the other one is not?

Do we mention ultra-known products?

What about antivirus products? We haven’t tested them all since there are independent industry experts who do a much better job.

Should we mention the services that are duplicated and basically do the same thing? Or should we stick to the best?

Why? Who decides what’s best for someone and what’s not?

Should we stick to what’s free or should we also add paid products?

Eventually we came up with what we’re about to read. But first here’s a quick guideline that you should read before we jump right to the subject:

We don’t claim that this is the ultimate list. It’s not complete and it’s definitely not final. It probably never will be. We are aware that we missed lots of essential, important tools – by mistake or just because we can’t know them all. So please feel free to jump in with more useful tools that you feel they should be mentioned.

We stayed away from recommending antivirus, VPN or firewall products. There are independent industry experts who only do that. Instead, we prefer to list those experts or websites that will help you compare such services, in order to choose what’s best for you.

Click here to Continue….