After initial scoring, we continue to monitor transactions with risk scores less than or equal to 10 for another 24 hours. If we receive new information related to these transactions that lead to a transaction having a re-calculated risk score greater than or equal to 75, we send out a minFraud Alert.
You can receive minFraud Alerts via email or webhook.
You can set an email where you would like to receive minFraud Alerts through the minFraud Alert configuration screen in your account portal (login required).
You can also receive minFraud Alerts by webhook, and integrate your own response to these alerts on your server. You can configure your minFraud Alert webhook settings through the minFraud Alert configuration screen in your account portal (login required).
The alert webhook URL should be an HTTPS endpoint that accepts
The User-Agent of the minFraud Alert service is
MaxMind MinFraud Alert Robot.
The following are the parameters that will be included in the query string of the request. Additional parameters may be added in the future.
|The billing city included in the original minFraud request.|
|The billing country included in the original minFraud request.|
|The date of the original minFraud request, e.g., |
|The email domain included in the original minFraud request.|
|The IP address included in the original minFraud request.|
|The minFraud Legacy |
|The minFraud ID of the original minFraud request.|
|The updated risk score, calculated after your initial query with additional information.|
|The risk score as originally calculated.|
|The billing postal included in the original minFraud request.|
|A human-readable description of why the minFraud alert was sent. See below for the current list of possible reasons.|
|A fixed, machine-readable code for the reason why the minFraud alert was sent. See below for the current list of possible reasons.|
|The billing region included in the original minFraud request.|
|The shop ID included in the original minFraud request. This will only be set if the original request included a shop ID.|
|The transaction ID included in the original minFraud request.|
|The date and time at which the new risk score was calculated, in RFC3339 format, e.g., |
These are the possible
reason_codes which might be returned with a minFraud
Alert. These codes are subject to change.
|Email on order was flagged as high-risk email, as it was associated with another high-risk order|
|Device ID has been marked as a high-risk device ID|
|IP address has been marked as a high-risk IP|
|IP is from High Risk Hosting Provider|
|IP address had high velocity of orders (e.g. different zipcodes on same IP address)|
You can secure your webhook by verifying that alert requests come from MaxMind:
- Check that requests come from one of the MaxMind IPs we list below.
- Check that requests are signed using a secret you configure in your minFraud Alert configuration screen in your account portal. Learn more about setting up signed requests below.
minFraud alert requests may come from one of the following IP addresses. This list is subject to change.
Alert requests can be signed by MaxMind. To enable signed requests, visit your minFraud Alert configuration screen in your account portal (login required) and set an Alert Webhook Secret.
Once you set a secret, each alert request will have an HTTP header with a signature of the request. You can calculate the signature of the request on your server and check it matches the signature in the header to verify the request is authentic.
For example, if the secret is
supersekret-0123456789 and the alert request
Then the request will include this header:
The signature is the hex encoded HMAC-SHA256 of the URL query parameters -
everything after the
?. In this case, the text to be signed is:
You can check the signaturing using something like the following code:
To avoid timing attacks, please use a secure comparison function rather the equals operator of your language.
This page was last updated on January 25, 2022.