Skip to main content

Device Failures

This document describes various device signals that can indicate anomalies or suspicious behavior. These signals contribute to deductions from the overall device score based on the device's activity or configuration. These deductions are classified into five severity levels: Extreme, Severe, Moderate, Minor and Dynamic.

Score Deductions

The following score deductions are applied based on the severity of the device's behavior. The device score starts at 100 and decreases based on detected fraud signals.

Deductions categories:

🔴 Critical Deductions (100 points)

These signals represent the most critical, high-risk behaviors, resulting in an immediate and complete deduction of the device score.

SignalDescription
Wrapper tamperingThe participant attempted to illegally modify or clear the browser's storage data related to the Quality Tools.

🔴 Extreme Deductions (90 points)

These signals indicate serious issues or high-risk activity and result in the highest deduction.

SignalDescription
Bot DetectionThe request behavior is consistent with that of an automated bot, potentially indicating scripted interactions, web scraping, or fraudulent activity (e.g., Selenium, Playwright).
TOR Network UsageThe device is accessing the service via the TOR network, which is commonly used to anonymize traffic and may indicate attempts to conceal identity or location.
IP BlockListThe device’s IP address is found on a known blocklist, indicating it may be associated with malicious, compromised, or abusive behavior.
Anti-Detect BrowserThe browser is using techniques to hide or avoid detection, which is typical of suspicious activities (e.g., Incogniton).
Compromised Mobile DeviceThe device has been compromised or jailbroken, indicating a significant security risk. This can happen when the quality tools are executed on:
  • iOS Jailbroken devices
  • Android rooted devices
  • Android emulator devices
  • Android cloned apps
This works only on requests coming directly from the Android/iOS SDK. Please contact us if this is your case.
Request BlockedThe request was actively blocked on the user's browser, and we cannot run the Quality Tools on the browser. This returns a device score of 0
Requests too fastCheck this section for more details.

🟠 Severe Deductions (60 points)

These signals suggest significant security or integrity concerns that need to be addressed.

SignalDescription
Developer Tools OpenThe browser's developer tools are open, a common indicator of someone attempting to inspect or manipulate the page, often seen in malicious activity.
Timezone MismatchThe device’s timezone does not match the expected one, potentially indicating fraudulent or spoofed activity.
Virtual MachineThe device is operating in a virtualized environment, commonly used for testing or by fraudsters to disguise its nature.
Location SpoofingThe location of the device is being spoofed, potentially indicating deceptive actions or attempts to hide its true origin.
Identity Reuse TamperingThe browser storage has been modified to distinguish the user's response as that of another participant.

🟡 Moderate Deductions (30 points)

These signals represent moderate concerns or potential security risks.

SignalDescription
Public VPNThe device is connected to a public VPN, which could be masking its real identity and may be used to bypass restrictions.
Privacy SettingsPrivacy settings on the device are configured to limit tracking, which could be used for hiding activity but could also indicate suspicious behavior.

🟢 Minor Deductions (10 points)

These signals represent minor concerns or behaviors that don’t pose an immediate risk but still contribute to the overall score.

SignalDescription
Incognito ModeThe device is using private or incognito browsing, which may indicate an attempt to conceal browsing activity.

Dynamic Deductions

Dynamic deductions are based on real-time device behavior and can vary in severity depending on detected anomalies. These deductions help identify potential tampering or unusually high activity, which may indicate fraudulent or automated behavior.

SignalDescriptionDeduction Range
Tampering DetectionIndicates that the browser has been altered or manipulated to evade detection mechanisms, which may be a sign of malicious activity.45-100
High Activity DeviceIndicates that the device is in the top 2% of most frequently identified devices, which could indicate excessive or automated use. It is calculated based on the number of requests in the last 24 hours across all of our customers' integrations3-100

Detected Device Failures (No Score Deduction)

Some device signals are detected and flagged for monitoring purposes, but do not directly reduce the device score. These signals may still indicate suspicious or noteworthy activity and should be considered when evaluating device integrity.

SignalDescription
ProxyThe device is using a proxy server to route its traffic, which can be used to mask its real IP address and may be associated with suspicious or fraudulent activity. Proxies can be:
  • Residential: Use real consumer internet connections, are harder to detect, and often used to bypass restrictions.
  • Datacenter: Hosted in commercial data centers, more commonly flagged for automated or bulk activity.
Each type presents different risk profiles.

Conclusion

This guide outlines the various signals that contribute to a device's overall security score. By evaluating these signals, we can determine the level of risk associated with the device’s behavior and take appropriate actions to mitigate any potential threats. The severity of each signal impacts the score deduction, with extreme signals contributing the highest penalties.