# Fraud Check

<figure><img src="/files/Bgc32BAojHa3rd1pkJNC" alt=""><figcaption></figcaption></figure>

**You can detect fraud with the following:**

* **Detect with user data:** This ensures user's entered data on the verification page is compared to government data information. If there's a mismatch, businesses can choose to fail the verification, indicating that the provided information doesn't match the official records. Alternatively, they can choose to put the verification change the status of the verification to pending for manual review, allowing for a closer inspection before making a decision.

<figure><img src="/files/YHKm9XgdTh98UlalBrou" alt="" width="507"><figcaption></figcaption></figure>

* **Detect with age limit:** This ensures businesses can detect fraudulent activities comparing the date of birth entered by the user with the government data, businesses can determine whether there is a match or not. If there are discrepancies or inconsistencies, businesses can choose to fail the verification, indicating that the provided age doesn't match the official records. Alternatively, they can pend the verification for manual review.

<figure><img src="/files/tfugNyfghy08LkbVi7vk" alt="" width="506"><figcaption></figcaption></figure>

* **Detect with Liveness:** This ensures businesses can detect fraudulent activities with Glasses on and Brightness level. Businesses can check for certain factors like the presence of glasses and the brightness level in the captured image. If glasses are detected, it can be flagged as potentially suspicious or non-compliant with the verification requirements. Similarly, the brightness level can be analyzed to ensure that the image was taken in proper lighting conditions and not manipulated or taken from a pre-existing photograph.

<figure><img src="/files/gR0CGIdbk9l9iWchwNRg" alt=""><figcaption></figcaption></figure>

* **Detect with AML Screening:** With AML screening, businesses can cross-check user's information against the anti-money laundering list or watchlist. This list typically contains individuals or entities involved in money laundering, terrorism financing, or other financial crimes.

  By conducting AML screening during the onboarding process, businesses can identify if the user matches any entries on the list. If a match is found, it can be flagged as potentially high-risk or suspicious activity.&#x20;

<figure><img src="/files/X0bMoYfPjMKnhBOZ1qJA" alt="" width="504"><figcaption></figcaption></figure>

* **Detect with IP/Device Screening:** By screening the IP address and device details of users, businesses can check if they are using an IP address that has been blacklisted due to previous fraudulent activities.

  If a user's IP address is flagged as blacklisted, it could indicate a higher risk of fraudulent behavior.&#x20;

<figure><img src="/files/FZemF86R34xh0dxsYdCo" alt="" width="506"><figcaption></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://guides.dojah.io/user-manual/identity-verification/easyonboard/verification-flows/fraud-check.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
