Fraud ring analysis
Antom Shield Pro provides an Artificial Intelligence (AI)‑driven fraud ring identification model designed to automatically detect and analyze hidden networks behind potential fraudulent activities. By leveraging the model’s ring analysis capabilities, businesses can better identify and prevent fraud, strengthening their overall security defenses.
Fraud ring list
Log in to the Antom Dashboard, you can navigate to Shield > Risk lab > Fraud rings to identify and analyze suspicious rings. The system automatically aggregates all accounts and transaction information associated with each ring, highlighting the total transaction amount and number of transactions involved. By clicking on any ring in the list, you can view detailed analysis information.
Fraud ring analysis details
Through intelligent identification and in‑depth analysis of potential fraud rings, Antom Shield Pro helps you clearly understand the connections between ring members, transaction details, and AI‑generated risk summaries, providing strong support for developing effective risk control strategies.
Risk association graph
For each potential fraud ring detected, Antom Shield Pro automatically generates an association graph, visually displaying the relationships between members through key connection factors such as:
- Bank card information
- Identifies bank cards linked to fraudulent activities via card fingerprint analysis.
- Device and network information
- Device information: Identifies devices used for fraudulent activities.
- IP address information: Identifies IP addresses frequently used for fraud.
- Identity and contact information
- Buyer account details: Recognizes related buyer IDs.
- Contact data: Identifies associated buyer emails, billing phone numbers, and shipping phone numbers.
- Address information: Links billing and shipping addresses related to fraudulent transactions.
Fraud rings details
On the Fraud rings page, you can review the full history of all transactions involving a specific ring. To view detailed information about a single transaction, click on the corresponding entry to open its details page.
AI summary of stolen‑card fraud rings
Using its AI knowledge base and large‑scale models, Antom Shield Pro conducts in‑depth analysis of detected stolen‑card fraud rings and extracts key risk characteristics to summarize group behaviors, providing actionable recommendations for your risk prevention and decision‑making processes.
Best practices
After completing the analysis of a fraud ring, you can strengthen your risk control strategy and minimize potential losses by taking the following measures:
- Blacklist configuration: When certain IP addresses, devices, or bank cards are repeatedly involved in multiple fraudulent transactions, quickly add them to the blacklist to block future fraudulent attempts.
- Rule and policy adjustment: Configure dynamic risk control rules based on ring characteristics, such as high‑frequency IPs or the number of associated accounts.
Note:
- Fraud ring analysis is a key capability for enabling proactive defense. It is recommended to regularly review newly discovered rings and promptly update blacklists and risk control rules.
- Before adjusting rules, use the Intelligent Simulation feature to evaluate potential effects and continuously optimize your risk management system.