Skip to main content

Device Fingerprinting

Get started with the API

Start using the Device Fingerprinting API under an hour.

Example app

See an example of how to use Device Fingerprinting to power MFA.

API reference

Device Fingerprinting API reference.

Block advanced programmatic attacks

Check for bots before any sensitive operation and prevent costly attacks against current users. Defend your application against:
  • Credential stuffing and brute-force attacks
  • Phishing and account takeover (ATO) attacks
  • Toll fraud
  • Account creation abuse

Block free trial abuse

Protect your resources for real users by stopping fake accounts.

Add bot protection

Implement invisible CAPTCHA bot protection for your application.

Use device information as an additional user identifier

Add or remove friction based on a user’s device with highly-unique and stable device identifiers:
  • Detect unrecognized devices or trusted devices
  • Ban all of a user’s account
  • Prevent seat sharing or enforce paywalls

Add a remembered device flow

Reduce login friction when users return on a known device.

New device notifications

Use Device Fingerprinting to notify users when a new device has logged into their account.

Add IP-geo restrictions

Use IP-based geographic filters for access control.

Protected Auth

Protected Auth is a ready-made solution in Stytch’s frontend & mobile SDKs that seamlessly integrates with Device Fingerprinting to detect and stop fraud, such as credential stuffing attacks.

Get started with Protected Auth

Add Protected Auth with no code changes.

About Protected Auth

Read more about Protected Auth and its configurations.

Learn about the platform

About Device Fingerprinting

Learn about Stytch’s fraud prevention framework.

Fingerprints & IDs

Learn about the different identifiers provided by Device Fingerprinting.

External metadata

Attaching additional metadata to fingerprints and verdicts.

Verdicts

Out-of-box decision verdicts for you to take action on.

Decisioning

Extend Device Fingerprinting’s decisioning with your own logic.

Enforcement

Enforce your decisioning in your application.

More resources

Go-live checklist

An integration checklist to help go live smoothly.

Developer resource guides

Additional guides for developers, such as custom domain configuration and testing your integration.