Skip to content

Latest commit

 

History

History
59 lines (56 loc) · 8.17 KB

File metadata and controls

59 lines (56 loc) · 8.17 KB

Event

Contains results from Fingerprint Identification and all active Smart Signals.

Properties

Name Type Description Notes
event_id str Unique identifier of the user's request. The first portion of the event_id is a unix epoch milliseconds timestamp For example: `1758130560902.8tRtrH`
timestamp int Timestamp of the event with millisecond precision in Unix time.
linked_id str A customer-provided id that was sent with the request. [optional]
environment_id str Environment Id of the event. For example: `ae_47abaca3db2c7c43` [optional]
suspect bool Field is `true` if you have previously set the `suspect` flag for this event using the Server API Update event endpoint. [optional]
sdk SDK [optional]
replayed bool `true` if we determined that this payload was replayed, `false` otherwise. [optional]
identification Identification [optional]
supplementary_id_high_recall SupplementaryIDHighRecall [optional]
tags Dict[str, object] A customer-provided value or an object that was sent with the identification request or updated later. [optional]
url str Page URL from which the request was sent. For example `https://example.com/` [optional]
bundle_id str Bundle Id of the iOS application integrated with the Fingerprint SDK for the event. For example: `com.foo.app` [optional]
package_name str Package name of the Android application integrated with the Fingerprint SDK for the event. For example: `com.foo.app` [optional]
ip_address str IP address of the requesting browser or bot. [optional]
user_agent str User Agent of the client, for example: `Mozilla/5.0 (Windows NT 6.1; Win64; x64) ....` [optional]
client_referrer str Client Referrer field corresponds to the `document.referrer` field gathered during an identification request. The value is an empty string if the user navigated to the page directly (not through a link, but, for example, by using a bookmark) For example: `https://example.com/blog/my-article` [optional]
browser_details BrowserDetails [optional]
proximity Proximity [optional]
bot BotResult [optional]
bot_type str Additional classification of the bot type if detected. [optional]
bot_info BotInfo [optional]
cloned_app bool Android specific cloned application detection. There are 2 values: * `true` - Presence of app cloners work detected (e.g. fully cloned application found or launch of it inside of a not main working profile detected). * `false` - No signs of cloned application detected or the client is not Android. [optional]
developer_tools bool `true` if the browser is Chrome with DevTools open or Firefox with Developer Tools open, `false` otherwise. [optional]
emulator bool Android specific emulator detection. There are 2 values: * `true` - Emulated environment detected (e.g. launch inside of AVD). * `false` - No signs of emulated environment detected or the client is not Android. [optional]
factory_reset_timestamp int The time of the most recent factory reset that happened on the mobile device is expressed as Unix epoch time. When a factory reset cannot be detected on the mobile device or when the request is initiated from a browser, this field will correspond to the epoch time (i.e 1 Jan 1970 UTC) as a value of 0. See Factory Reset Detection to learn more about this Smart Signal. [optional]
frida bool Frida detection for Android and iOS devices. There are 2 values: * `true` - Frida detected * `false` - No signs of Frida or the client is not a mobile device. [optional]
ip_blocklist IPBlockList [optional]
ip_info IPInfo [optional]
proxy bool IP address was used by a public proxy provider or belonged to a known recent residential proxy [optional]
proxy_confidence ProxyConfidence [optional]
proxy_details ProxyDetails [optional]
incognito bool `true` if we detected incognito mode used in the browser, `false` otherwise. [optional]
jailbroken bool iOS specific jailbreak detection. There are 2 values: * `true` - Jailbreak detected. * `false` - No signs of jailbreak or the client is not iOS. [optional]
location_spoofing bool Flag indicating whether the request came from a mobile device with location spoofing enabled. [optional]
mitm_attack bool * `true` - When requests made from your users' mobile devices to Fingerprint servers have been intercepted and potentially modified. * `false` - Otherwise or when the request originated from a browser. See MitM Attack Detection to learn more about this Smart Signal. [optional]
privacy_settings bool `true` if the request is from a privacy aware browser (e.g. Tor) or from a browser in which fingerprinting is blocked. Otherwise `false`. [optional]
root_apps bool Android specific root management apps detection. There are 2 values: * `true` - Root Management Apps detected (e.g. Magisk). * `false` - No Root Management Apps detected or the client isn't Android. [optional]
rule_action EventRuleAction [optional]
suspect_score int Suspect Score is an easy way to integrate Smart Signals into your fraud protection work flow. It is a weighted representation of all Smart Signals present in the payload that helps identify suspicious activity. The value range is [0; S] where S is sum of all Smart Signals weights. See more details here: https://docs.fingerprint.com/docs/suspect-score [optional]
tampering bool Flag indicating browser tampering was detected. This happens when either: * There are inconsistencies in the browser configuration that cross internal tampering thresholds (see `tampering_details.anomaly_score`). * The browser signature resembles an "anti-detect" browser specifically designed to evade fingerprinting (see `tampering_details.anti_detect_browser`). [optional]
tampering_details TamperingDetails [optional]
velocity Velocity [optional]
virtual_machine bool `true` if the request came from a browser running inside a virtual machine (e.g. VMWare), `false` otherwise. [optional]
vpn bool VPN or other anonymizing service has been used when sending the request. [optional]
vpn_confidence VpnConfidence [optional]
vpn_origin_timezone str Local timezone which is used in timezone_mismatch method. [optional]
vpn_origin_country str Country of the request (only for Android SDK version >= 2.4.0, ISO 3166 format or unknown). [optional]
vpn_methods VpnMethods [optional]
high_activity_device bool Flag indicating if the request came from a high-activity visitor. [optional]
raw_device_attributes RawDeviceAttributes [optional]

[Back to Model list] [Back to API list] [Back to README]