Threat Management for Fraud Detection
Threat management tools for threat intelligence, advanced persistent threat detection, and cyber threat analysis. Task: Fraud Detection
Browse 30 security tools
FEATURED
- Home
- Categories
- Threat Management
- Fraud Detection
USE CASES
Web data platform providing open, deep & dark web APIs and monitoring.
Blockchain threat intel & crypto forensics platform for AML and investigations.
Free mule account alert feed for banks to detect scam-linked accounts.
Secure collaboration platform for detecting suspicious accounts via shared signals
IP address blocklist service for identifying and blocking fraudulent IPs
Real-time IP fraud detection and risk scoring API for identifying malicious IPs
API service for detecting proxies, VPNs, Tor nodes, and malicious IPs
Database for detecting proxies, VPNs, Tor nodes, and high-risk IP addresses
Daily threat intel feed identifying malicious IPs with abuse classifications
Threat intelligence feeds covering 100+ attack types with 5-min updates
AI-driven scam detection via victim emulation in peer-to-peer conversations
Real-time fraud intelligence sharing platform with GDPR-compliant tokenization
Cyber intelligence services for digital exposure monitoring and threat analysis
Database for detecting VPNs, proxies, Tor exits, and anonymization services
Screens blockchain addresses for risk and provides allow/deny recommendations.
Threat intelligence platform for cyber, physical, vulnerability & national sec
Investigative intelligence service for law enforcement agencies
CTI platform for threat analysis, dark web monitoring, and data breach detection
Threat intelligence feeds for SOC teams from social, dark web & botnet sources
AI-powered investigation tool for analyzing identity exposures from darknet data
Real-time identity protection monitoring compromised credentials on dark web
IP intelligence platform for proxy/VPN detection and geolocation
IP geolocation databases and APIs for location-based content and traffic analysis
API providing access to compromised identity data and threat signals
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox