How it works
Features
Pricing
Documentation
Blog
Log in
Sign up
One API for IP, device & user risk insights
Device data
, smart rules for
reviewing/blocking users
,
allowlisting
of IP addresses, and alerts for
repeat signups
or
credential sharing
.
10k events/mo free
Read the docs
Catch fake details, and protect from risks
Catch fake details
Danger will tell you if any of the details provided are fake, mismatched, or unusual.
Stop repeat signups
Shows you all events linked to the same person, even when they attempt to use evasions.
Protect from risks
Choose from one-click smart rules for instant protection, or use custom rules for precision.
Powerful dashboard
Search, filter, and review every event in high-definition through the dashboard.
Validate data
Apply rules
Block bad actors
Validate user details on signup
Real-time API data enrichment.
Easily know the user's country and timezone.
Checks emails, phone numbers and addresses are real and usable.
Geolocate addresses.
Plug and play risk protection
Put a stop to fake phone numbers.
Restrict sign-ups to your home country.
Stop disposable email signups.
Block or review user risks
Recognise anonymous users (e.g. VPN, Tor).
Flag up users who signup in incognito mode (private browsing).
Block bots without impacting real users.
Stop repeated sign ups and trial abuse
Danger can link events to the same person, even when they attempt evasions such as incognito mode, clearing cookies, or using VPNs.
Identify credential sharing
Take immediate action when an email is associated with too many separate devices. Powerful intelligence that you can enable with just a few clicks.
Account history
Uncover throwaway emails
Danger can spot email accounts that have just been created by scammers to use as temporary addresses.
It does this by checking if the email is registered on 20 apps and services in real-time.
Registration status on 20 sites
Public breach history
"spotify":
false
,
"paypal":
true
,
"instagram":
false
,
"breaches":
[
"SHEIN"
]
,
"valid":
true
,
"local_part":
"dan"
,
"domain":
"example.com"
,
"domain_age":
2422
,
"name_match":
true
,
"free":
false
,
"disposable":
false
,
Email address
Rule out invalid email addresses
Check if the email address is valid, and look out for common traits of suspicious email addresses.
Email address deliverability
Recently created, or suspicious registrar
Free or disposable providers
Fuzzy match on name and email
Other common bogus email traits
Device & browser
Insights on the browser
Danger provides rich data describing the device that the person is using.
Stable device fingerprint
Type of browser
Detects private/incognito mode
Bot detection
Parses the user agent
"fingerprint":
"773906b0efdefa24a7f2b.."
,
"bot"
false
,
"browser":
"Safari"
,
"private_browsing":
false
,
"ua_os_family":
"iOS"
,
"ua_os_version":
"17.3.1"
,
"timezone":
"America/Chicago"
,
"valid":
true
,
"postal_code_match":
true
,
"address1":
"35 Lodgeville Rd"
,
"city":
"Minneapolis"
,
"country_code":
"US"
,
"latitude":
44.9255
,
"longitude":
-93.3034
,
Home address
Match a typed address to a real location
Check every address is valid and that the postal code is a match.
Checks any address for validity
Returns an address in standard format
Latitude and longitude resolution
Postal code match
Proximity
Does the location add up?
Ensure the phone, address, device, and IP are all in the same location.
Distance between IP and address
Timezone match
Country match
"device_ip_timezone_match":
true
,
"address_ip_distance":
27.25
,
"address_ip_country_match":
true
,
"address_phone_country_match":
true
,
"isp":
"Danger Network Inc"
,
"organization":
"Danger Company"
,
"type":
"business"
,
"vpn":
true
,
"proxy":
false
,
"tor":
false
,
"hosting":
false
,
IP address
Spot IP address threats
Surface problem IP addresses such as those assigned to VPN providers, proxies, or IPs on blocklists.
ASN, company, carrier, and location data
Threat flags (VPN, relay, proxies, TOR, etc.)
IP blocklists
Phone number
Dig deep into the phone network
Check for problem number types and providers, and check that the number is currently reachable (switched on).
Parses any number into standard formats
Number type (VoIP, mobile, etc.)
Live reachability (HLR dip)
Current phone network
Number location (country)
"valid":
true
,
"carrier":
"T-Mobile"
,
"carrier_high_risk":
false
,
"country_name":
"United States"
,
"country_code":
"US"
,
"type":
"mobile"
,
"reachable":
true
,
Manage everything through the dashboard
Custom rules
enable you to allow, block, or review based on your exact criteria, and then refine over time.
There's an
event review queue
so you'll never miss a potential problem. The dashboard lets you search for and dig into any event.
The
allowlist
makes it easy to allow any email or IP address to override your rules. Great for support and internal users.
Risks are highlighted
against each datapoint so you can quickly review them. Scan an event to see every rule match.
Protect any website or app
Lead forms:
Flag bogus or repeat leads and avoid wasting time on them.
Trials & freemium:
Block account abuse in real-time before provisioning resources.
Sign ups:
Make sure new users are real and reachable right from the start.
Free plan
Free forever for essential risks and up to 10k events per month. Compare
pricing and plans
.
Unobtrusive
Never gets in the way of your users. No browser challenge, and doesn't set any cookies.
Easy to work with
Implementation is similar to captcha services. Follow our simple
getting started
tutorial to start.
Reliable, secure
High availability architecture, encryption at rest, and secure throughout.
Simple and clear pricing
Free
$
0
/mo
Sign up
10k events/month
1 site
Location and risky email smart rules
Allowlist, event reviews, and dashboard
Pro
$
25
/mo
Sign up
50k events/month
10 sites
Smart rules
Custom rules
Repeat new user risks
Email history & extended phone checks
Business
$
250
/mo
Sign up
750k events/month
Unlimited sites
Smart rules
Custom rules
Repeat new user risks
Credential sharing risks
Email history & extended phone checks
Danger is free forever up to 10k events/mo
Start right now
Read the docs