IRBIS enriches checkout and account data with phone intelligence, email graph, IP signals, and breach data. Feed your fraud engine real identity signals — not just transaction patterns.
Fraud models built on transaction patterns miss the signals that live in identity data. Here's what your current stack is probably getting wrong.
Six types of identity signal — each one a data point your fraud model currently doesn't have.
IRBIS is identity intelligence infrastructure — it feeds your fraud engine the signals it needs to make sharper decisions.
These are the specific combinations IRBIS surfaces — the ones that transaction data alone can't see.
For e-commerce fraud, the key question is which signals you can access and whether they cover international orders. Most providers fall short on both.
| Signal / capability | IRBIS | Ekata | Telesign | Sift | LexisNexis | Pipl |
|---|---|---|---|---|---|---|
| VoIP / line type detection | ✓ | ✓ | ✓ Core | Partial | ✓ | ✗ |
| Social footprint depth | ✓ | Partial | ✗ | Behavioral | Partial | ✓ |
| IP geolocation + VPN/Tor | ✓ | ✓ | Partial | ✓ | ✓ | ✗ |
| Phone-vs-IP country mismatch | ✓ | Partial | ✗ | ✗ | ✗ | ✗ |
| Name-vs-phone validation | ✓ | Partial | Partial | ✗ | ✓ | ✗ |
| Breach / dark web exposure | ✓ | ✗ | ✗ | ✗ | Partial | ✗ |
| Reverse face / photo search | ✓ Unique | ✗ | ✗ | ✗ | ✗ | ✗ |
| International / non-US coverage | ✓ 200+ | US-heavy | ✓ | ✓ | ✓ | Partial |
| Raw signal data (not just score) | ✓ | Score only | Score only | Score only | Score only | Partial |
| All signals under one API key | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
| Pay per lookup (no subscription) | ✓ | Enterprise | Subscription | Subscription | Enterprise | Subscription |
Add IRBIS enrichment to your existing checkout flow in a few hours. One POST request — returns the signals you need for your fraud model to make a better decision.
# Enrich at checkout — phone + IP + breach curl -X POST \ https://irbis.espysys.com/api/developer/post \ -H "Authorization: Bearer YOUR_KEY" \ -H "Content-Type: application/json" \ -d '{ "searches": [ { "id": "phone", "term": "+14155552671" }, { "id": "real_phone", "term": "+14155552671" }, { "id": "ip", "term": "185.220.101.47" }, { "id": "breach", "term": "buyer@gmail.com" } ] }' # Get lookupId back immediately { "lookupId": "lk_7f4c21b9e" } # Retrieve results (10-30 seconds) curl \ https://irbis.espysys.com/api/developer/results/lk_7f4c21b9e \ -H "Authorization: Bearer YOUR_KEY"
searches array takes multiple signal types in a single POST — phone, IP, and breach check in one round trip rather than three separate API calls.lookupId immediately. Your checkout flow doesn't wait on the enrichment — you retrieve results asynchronously and apply them to the order risk score before fulfilment.lookupId approach means your checkout flow never blocks waiting for a data lookup to finish.