Our Fight Against Fraud


stop fraud

Recently, our anti-fraud technology has reported a large number of accounts. Regrettably, some individuals are unaware of how and why their accounts have been limited. That is why we will explain how our anti-fraud software works in this post.


We are dedicated to making InstantCloudMining a safer environment for all of our users. Before providing you certain financial products and services, we may require you to validate your personal information or business entity in line with federal laws.



Our measures to fight fraud


1 - Device Fingerprinting

ICM's Device Fingerprint Technology allows us to further analyze our users, transactions, ad traffic, and similar data to produce highly accurate Fraud Scores. Multi-layered AI & machine learning algorithms analyze user behavior and intent against millions of patterns to accurately identify high risk activity. Over hundreds of data points are scored to produce a confident result for fraud prevention.

  • Low Quality Users - Identify duplicate user accounts, bogus user information, and fake registrations. Automatically prevent low quality users from getting in the system.

  • Click Fraud & Invalid Clicks - Solve click fraud quality issues with real-time click filtering and ensure only high quality clicks.

  • Chargebacks & Payment Fraud - Prevent chargebacks, high risk transactions, and all types of payment ecommerce fraud.

  • Account Takeover - Monitor accounts for unusual behavior and session hijacking attempts.

  • Bot Detection - Filter non-human traffic in real-time with bot detection tools.

  • High Risk Behavior - Analyze user behavior against millions of high risk patterns that indicate a user's intent to engage in fraudulent activity.


device fingerprinting


2 - Email Verification API

We will never require project participants and users to deposit cryptocurrency to any addresses.


Routine email list cleaning is a best practice utilized by the largest brands and mailers to ensure healthy deliverability rates. Major email service providers like Gmail.com, Yahoo.com, Hotmail.com, AOL.com, Outlook.com, and other large providers worldwide will block senders with high bounce rates and poor domain or IP address reputation. Cleaning your email lists from spam traps, complainers, and invalid emails will prevent inbox bounces to ensure your mail reaches the inbox and not the spam folder.


Analyze email address reputation in real-time with email risk analysis including the email's creation date using an estimate of the email age based on when the email was first discovered by the software. The creation date is often referred to as the "First Seen" date. In addition to detecting disposable email services and parked domains, We can also identify perfectly valid email addresses that have recently engaged in abusive behavior. Through our honeypot threat network and partner feedback program, We can identify email addresses which were recently involved with chargebacks, fake account creation, account takeover, SPAM, trial abuse, and high risk behavior.


  • Lead Generation & User Data Verification - Ensure data that we are collecting or purchasing is valid, accurate, and fresh using real-time email risk scoring.

  • List Cleaning - Cleanse our email lists by removing invalid and inactive email addresses to ensure healthy bounce rates. Allow our email to have the best chance of inboxing and reaching our clients.

  • Spam Traps - Identify spam traps and honeypot email addresses that negatively impact our user's base.

  • Hard Bounces - Prevent hard bounces by pre-screening email addresses before messaging them.

  • Disposable Email Services - Easily block disposable email addresses and temporary mail services that allow fraudsters to spawn new emails at any time.


email verification api


3 - Phone Validation API

ICM's Phone Number Validation API enables quick user verification and chargeback defense on a global scale by analyzing phone numbers to verify their risk score, country of origin, carrier, validity, and line connection status while also detecting fraudulent activity in real time.


Perform carrier lookups in any region to detect disconnected phone numbers and retrieve important carrier info including line types to determine if a number is a VOIP, landline, mobile/wireless, or prepaid line.


  • Low Quality Users - Identify duplicate user accounts, stolen user data, and fake registrations. Automatically block low quality accounts.

  • Chargebacks & Payment Fraud - Mitigate chargebacks, high risk transactions, and all types of ecommerce fraud by detecting phone numbers associated with recent malicious behavior.

  • Instant Validation - Identify disconnected or inactive phone numbers to quickly validate user data to screen applications, registrations, and payments.

  • Bot Detection - Filter nonexistent and bogus phone numbers to stop bots, risky users, and bad leads.

  • Geo Filtering - Filter users by validating their phone number matches their location. Pair with IP Reputation scoring for comprehensive geo filtering.

  • High Risk Behavior - Analyze user phone numbers to prevent fraudulent numbers by detecting disposable SMS, temporary phone numbers, Google Voice, and VOIPs.

  • Lead Generation & User Data Verification - Ensure data that you are collecting is valid, accurate, and fresh to prevent fake leads.


Phone Validation API


4 - Proxy/VPN Detection

  • Low Quality Users - Identify duplicate user accounts, bogus user information, and fake registrations. Automatically flag low quality users from hurting our system integrity.

  • Chargebacks & Payment Fraud - Prevent chargebacks, high risk transactions, and all types of ecommerce fraud.

  • Click Fraud & Invalid Clicks - Solve click fraud quality issues with real-time click filtering and ensure only high quality clicks. Stop all forms of invalid traffic.

  • IP Reputation - Analyze IP Address reputation to detect proxies, VPNs, and TOR connections and determine the likeliness of fraudulent activity.

  • Account Takeover - Monitor accounts for unusual behavior and session hijacking attempts.

  • Bot Detection - Filter non-human traffic in real-time with IPQS bot detection tools.

  • Geo Filtering - Prevent users from bypassing requirements and conditions for accessing content outside their country of residence.

  • High Risk Behavior - Analyze user behavior against millions of high risk patterns that indicate a user's intent to engage in fraudulent activity.

  • Lead Generation & User Data Verification - Ensure data that you are collecting is valid, accurate, and fresh.


Proxy VPN Detection


I have been flagged what to do next ?

We urge you to contact us so that we can verify your identity. You will have full access to your account after these verifications are completed. Please be aware that we will never ask you for sensitive or confidential information.


What will happen if it is a false positive

In this scenario, you will be paid for the time spent away from your account. This means you'll receive instant access as well as a starting balance to make up for the time you've been waiting.


Why having such anti fraud software

We strive to make every effort to reduce fraud to a minimum. However, despite all our efforts, there are still malicious users who want to reach our system. In order to guarantee the security not only for our system but also for our users. We have decided to invest in a fraud detection system as you can read above. Of course, we decided to add the option of identity verification to provide your access back immediately.


Any questions ?

Feel free to call us at +1 (415) 539-2798 or contact us by creating a ticket.