Login - Fraud Evaluation Demo

Simulates a user login. Credentials are validated locally (always succeeds in this demo), then the event is sent to POST /api/fraud/evaluate with eventType: "Login".


IP Address
Resolving your real public IP...

Your real public IP is auto-detected via external resolver. Override with any IP to test geo/VPN/blacklist fraud scenarios.
Cancel
What happens:
  1. Your real public IP is auto-detected (or use the override to test)
  2. User-Agent and Device ID are collected automatically
  3. POST /api/fraud/evaluate is called with eventType: "Login"
  4. FraudEngine auto-resolves geo data from IP via ip-api.com
  5. 14 fraud scenarios are evaluated
  6. Actions are enforced in priority order
Test IPs to try:
  • 8.8.8.8 - Google DNS (US)
  • 1.1.1.1 - Cloudflare (US)
  • 185.220.101.1 - Known Tor exit node
  • 91.108.56.1 - Telegram servers (UK)
  • 5.34.178.1 - Iran (high-risk FATF)
  • 175.45.176.1 - North Korea (high-risk FATF)