Background and Challenges

Mobile phone number registration is the most mainstream account registration method at present. Therefore, mobile phone number has become the key element of Internet business authentication and it has become the target of black market and the core resource of the confrontation between black market and platform risk control. At present, the mobile phone number resources used by the black market have formed a complete industrial chain from acquisition, sales to use and recycling, which poses an enormous threat to the security of the platform business.

Product Introduction
Based on Threat Hunter's unique honeypot technology and black market intelligence system, Threat Hunter mobile phone number risk profile fully analyzes the behavior and attributes of mobile phone numbers, comprehensively evaluates the risk categories of mobile phone numbers, and accurately assigns the corresponding risk tags to mobile phone numbers, which can effectively help the platform reduce the risk of business fraud.
Product Functions
Accurately identify the high-risk phone number
The risk tag timely evaluates the risk level of the mobile phone number, with an accuracy of 99.5%.
Accurate traceability of risk number
Report the historical attack behaviors and time of the risk number as the basis for business risk judgment.
'Interception card' risk perception
More anonymous phone card categories, enabling business risk system to make accurate decisions.
Regularly update number risk
Check and re-evaluate the stock data to ensure the accuracy of the data.
Product Advantages
High accuracy
The data is from Threat Hunter's global honeypot network malicious traffic monitoring, with an accuracy of 99.9%.
High coverage rate
The largest mobile phone number tag library in China, with a total amount of more than 220 million.
Strong interpretability
Report the historical attack behaviors and time of the risk number as the basis for business risk judgment; recognize anonymous phone card categories such as interception card, virtual card enabling business risk system to make accurate decisions.
Application scenario
Identification of malicious registration
Accessing the mobile phone number profile in the registration process can timely block the registration of risk mobile phone numbers, and avoid the rewards for inviting the new customer being taken.
Identification of marketing activities risk
Accessing the mobile phone number profile in the marketing activities can find the black market behavior of taking a large number of coupons, and conduct targeted interception to avoid malicious use of the marketing activities.
Identification of malicious traffic source
Access the mobile phone number profile in the login process, and find the risk account through the historical evil behavior of the risk number, which can be blocked to solve the problem of malicious traffic.
Start a trial