Contains results from Fingerprint Identification and all active Smart Signals.
| Name | Type | Description | Notes |
|---|---|---|---|
| event_id | str | Unique identifier of the user's request. The first portion of the event_id is a unix epoch milliseconds timestamp For example: 1758130560902.8tRtrH |
|
| timestamp | int | Timestamp of the event with millisecond precision in Unix time. | |
| linked_id | str | A customer-provided id that was sent with the request. | [optional] |
| environment_id | str | Environment Id of the event. For example: ae_47abaca3db2c7c43 |
[optional] |
| suspect | bool | Field is true if you have previously set the suspect flag for this event using the Server API Update event endpoint. |
[optional] |
| sdk | SDK | [optional] | |
| replayed | bool | true if we determined that this payload was replayed, false otherwise. |
[optional] |
| identification | Identification | [optional] | |
| supplementary_id_high_recall | SupplementaryIDHighRecall | [optional] | |
| tags | Dict[str, object] | A customer-provided value or an object that was sent with the identification request or updated later. | [optional] |
| url | str | Page URL from which the request was sent. For example https://example.com/ |
[optional] |
| bundle_id | str | Bundle Id of the iOS application integrated with the Fingerprint SDK for the event. For example: com.foo.app |
[optional] |
| package_name | str | Package name of the Android application integrated with the Fingerprint SDK for the event. For example: com.foo.app |
[optional] |
| ip_address | str | IP address of the requesting browser or bot. | [optional] |
| user_agent | str | User Agent of the client, for example: Mozilla/5.0 (Windows NT 6.1; Win64; x64) .... |
[optional] |
| client_referrer | str | Client Referrer field corresponds to the document.referrer field gathered during an identification request. The value is an empty string if the user navigated to the page directly (not through a link, but, for example, by using a bookmark) For example: https://example.com/blog/my-article |
[optional] |
| browser_details | BrowserDetails | [optional] | |
| proximity | Proximity | [optional] | |
| bot | BotResult | [optional] | |
| bot_type | str | Additional classification of the bot type if detected. | [optional] |
| bot_info | BotInfo | [optional] | |
| cloned_app | bool | Android specific cloned application detection. There are 2 values: * true - Presence of app cloners work detected (e.g. fully cloned application found or launch of it inside of a not main working profile detected). * false - No signs of cloned application detected or the client is not Android. |
[optional] |
| developer_tools | bool | true if the browser is Chrome with DevTools open or Firefox with Developer Tools open, false otherwise. |
[optional] |
| emulator | bool | Android specific emulator detection. There are 2 values: * true - Emulated environment detected (e.g. launch inside of AVD). * false - No signs of emulated environment detected or the client is not Android. |
[optional] |
| factory_reset_timestamp | int | The time of the most recent factory reset that happened on the mobile device is expressed as Unix epoch time. When a factory reset cannot be detected on the mobile device or when the request is initiated from a browser, this field will correspond to the epoch time (i.e 1 Jan 1970 UTC) as a value of 0. See Factory Reset Detection to learn more about this Smart Signal. | [optional] |
| frida | bool | Frida detection for Android and iOS devices. There are 2 values: * true - Frida detected * false - No signs of Frida or the client is not a mobile device. |
[optional] |
| ip_blocklist | IPBlockList | [optional] | |
| ip_info | IPInfo | [optional] | |
| proxy | bool | IP address was used by a public proxy provider or belonged to a known recent residential proxy | [optional] |
| proxy_confidence | ProxyConfidence | [optional] | |
| proxy_details | ProxyDetails | [optional] | |
| incognito | bool | true if we detected incognito mode used in the browser, false otherwise. |
[optional] |
| jailbroken | bool | iOS specific jailbreak detection. There are 2 values: * true - Jailbreak detected. * false - No signs of jailbreak or the client is not iOS. |
[optional] |
| location_spoofing | bool | Flag indicating whether the request came from a mobile device with location spoofing enabled. | [optional] |
| mitm_attack | bool | * true - When requests made from your users' mobile devices to Fingerprint servers have been intercepted and potentially modified. * false - Otherwise or when the request originated from a browser. See MitM Attack Detection to learn more about this Smart Signal. |
[optional] |
| privacy_settings | bool | true if the request is from a privacy aware browser (e.g. Tor) or from a browser in which fingerprinting is blocked. Otherwise false. |
[optional] |
| root_apps | bool | Android specific root management apps detection. There are 2 values: * true - Root Management Apps detected (e.g. Magisk). * false - No Root Management Apps detected or the client isn't Android. |
[optional] |
| rule_action | EventRuleAction | [optional] | |
| suspect_score | int | Suspect Score is an easy way to integrate Smart Signals into your fraud protection work flow. It is a weighted representation of all Smart Signals present in the payload that helps identify suspicious activity. The value range is [0; S] where S is sum of all Smart Signals weights. See more details here: https://docs.fingerprint.com/docs/suspect-score | [optional] |
| tampering | bool | Flag indicating browser tampering was detected. This happens when either: * There are inconsistencies in the browser configuration that cross internal tampering thresholds (see tampering_details.anomaly_score). * The browser signature resembles an "anti-detect" browser specifically designed to evade fingerprinting (see tampering_details.anti_detect_browser). |
[optional] |
| tampering_details | TamperingDetails | [optional] | |
| velocity | Velocity | [optional] | |
| virtual_machine | bool | true if the request came from a browser running inside a virtual machine (e.g. VMWare), false otherwise. |
[optional] |
| vpn | bool | VPN or other anonymizing service has been used when sending the request. | [optional] |
| vpn_confidence | VpnConfidence | [optional] | |
| vpn_origin_timezone | str | Local timezone which is used in timezone_mismatch method. | [optional] |
| vpn_origin_country | str | Country of the request (only for Android SDK version >= 2.4.0, ISO 3166 format or unknown). | [optional] |
| vpn_methods | VpnMethods | [optional] | |
| high_activity_device | bool | Flag indicating if the request came from a high-activity visitor. | [optional] |
| raw_device_attributes | RawDeviceAttributes | [optional] |