免费
每月$0。无需信用卡。
- 免费KYC捆绑包(身份验证 + 被动活体检测 + 人脸匹配 + 设备和IP分析)——每月500次,永久有效
- 黑名单用户
- 重复检测
- 每次会话200+欺诈信号
- Didit网络中可重复使用的KYC
- 案例管理平台
- 工作流程构建器
- 公开文档、沙盒、SDK、MCP(模型上下文协议)服务器
- 社区支持




全球2,000多家组织信赖。
200+ 欺诈信号
每个会话都会返回设备品牌、型号、浏览器系列、操作系统、平台和稳定的设备指纹——与完整的 IP 地理定位、网络运营商、虚拟专用网络 (VPN) / 代理 / Tor 标志、数据中心标志以及重复设备 + 重复 IP 规则配对。一次调用,200 多个信号,p99 低于 2 秒。
选择您想要的检查项——身份、活体、人脸匹配、制裁、地址、年龄、电话、电子邮件、自定义问题。将它们拖入仪表板中的流程,或将相同的流程发布到我们的 API。根据条件进行分支,运行 A/B 测试,无需代码。
使用我们的 Web、iOS、Android、React Native 或 Flutter SDK 进行原生嵌入。重定向到托管页面。或者只需通过电子邮件、短信、WhatsApp 等任何方式向您的用户发送链接。选择适合您技术栈的方式。
Didit 托管摄像头、灯光提示、移动设备切换和可访问性。当用户处于流程中时,我们会实时评估 200 多个欺诈信号,并根据权威数据源验证每个字段。两秒内出结果。
实时签名 Webhook 可在用户被批准、拒绝或发送审核时立即同步您的数据库。按需轮询 API。或者打开控制台检查每个会话、每个信号,并按您的方式管理案例。
国家 · 地区 · 城市 · 纬度 · 经度
国家
IP 国家
城市
与身份证件的距离
VPN · 代理 · Tor 出口节点
根据请求自动标记 is_data_center
按应用 · 按工作流程
独立或捆绑 · 按会话付费
独立 IP 检查
完整KYC · 包含IP
{
"ip_analysis": {
"status": "Approved",
"is_vpn_or_tor": false,
"is_data_center": false,
"price": "$0.03"
}
}$ curl -X POST https://verification.didit.me/v3/session/ \
-H "x-api-key: $DIDIT_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"workflow_id": "wf_ip_only",
"vendor_data": "user-42"
}'ip_address 和 device_fingerprint。文档 →// Your endpoint receives a signed payload
app.post("/webhooks/didit", (req, res) => {
const sig = req.headers["x-signature-v2"];
const expected = crypto.createHmac("sha256", SECRET)
.update(req.rawBody).digest("hex");
if (sig !== expected) return res.sendStatus(401);
const { status, decision, vendor_data } = req.body;
// status: Approved | Declined | In Review | ...
res.sendStatus(200);
});# Didit Device & IP Analysis — integrate in 5 minutes
You are integrating Didit's Device & IP Analysis (VPN, datacenter, Tor, geolocation,
device intelligence) module into <my_stack>. Follow these steps exactly.
Every URL, header, and enum value below is canonical — do not paraphrase
or "improve" them.
## 1. Provision an account
- Sign up: https://business.didit.me (no credit card required).
- Or provision programmatically: POST https://apx.didit.me/auth/v2/programmatic/register/
(returns an API key bound to the workspace + application).
## 2. Integration path — Workflow Builder (session-only)
Device & IP Analysis runs inside a Didit session — there is no standalone
POST /v3/ip-analysis/ endpoint. The IP and device fingerprint are
captured automatically when the user lands on the hosted UI, so you
do not collect or send them yourself.
1. Create a workflow that includes the IP_ANALYSIS feature:
POST https://verification.didit.me/v3/workflows/
Authorization header: x-api-key: <your-api-key>
Body: workflow_label, features array including
{ feature: "IP_ANALYSIS" } (UPPERCASE — strict enum)
Combine with ID_VERIFICATION, LIVENESS, FACE_MATCH in the same
workflow for the full $0.33 Know Your Customer (KYC) bundle (Device & IP Analysis is included).
2. (Optional) Configure per-warning actions in the console for the
application — pick Decline, Review, or Approve for each of
PRIVATE_NETWORK_DETECTED, COUNTRY_FROM_DOCUMENT_DOES_NOT_MATCH_COUNTRY_FROM_IP,
EXPECTED_IP_ADDRESS_MISMATCH, DUPLICATED_IP_ADDRESS,
DUPLICATED_DEVICE_FINGERPRINT.
3. (Optional) Pin an expected IP per session: pass expected_ip_address
in the POST /v3/session/ body if you already know where the user
should be (for example: their last known login IP).
4. Create a verification session for an end user:
POST https://verification.didit.me/v3/session/
Body: workflow_id (from step 1), vendor_data (your own user id),
optional expected_ip_address.
Response: session_url — redirect the user to it.
5. Listen for webhook callbacks (see "Webhooks" below).
## 3. Webhooks
- Register a webhook destination once via
POST https://verification.didit.me/v3/webhook/destinations/
Body: url, subscribed_events: ["session.verified", "session.review_started",
"session.declined"]
- Response includes secret_shared_key — store it.
- Every webhook delivery carries an X-Signature-V2 header you MUST verify
before trusting the payload. HMAC-SHA256 verification MUST run against the raw body bytes (the raw payload as Didit sent it) BEFORE any JSON parsing — re-serialising the parsed body changes whitespace and key order, which invalidates the signature.Algorithm:
1. sortKeys(payload) recursively
2. shortenFloats (truncate trailing zeros after the decimal point)
3. JSON.stringify the result
4. HMAC-SHA256 with the secret_shared_key
5. Hex-encode, compare to the X-Signature-V2 header.
## 4. Reading the report
The session decision payload contains an ip_analysis object with:
- status: "Approved" | "Declined" | "In Review" | "Not Finished"
- ip_address, ip_country, ip_country_code, ip_state, ip_city
- latitude, longitude, time_zone, time_zone_offset
- isp, organization
- is_vpn_or_tor (boolean) — fires the PRIVATE_NETWORK_DETECTED warning
- is_data_center (boolean) — hosting/datacenter origin
- device_brand, device_model, browser_family, os_family, platform
(mobile or desktop)
- locations_info with ip, id_document, poa_document blocks — each
carries a location object plus distance_from_* fields in kilometres
- matches array — cross-session matches on ip_address or
device_fingerprint when the same value appears under a different
vendor_data
- warnings array — each entry has risk, log_type,
short_description, long_description
Auto-decline risks (always enforced by Didit, not configurable):
- IP_ADDRESS_IN_BLOCKLIST
- DEVICE_FINGERPRINT_IN_BLOCKLIST
Configurable risks (action per workflow — Decline, Review, or Approve):
- PRIVATE_NETWORK_DETECTED (VPN, proxy, Tor)
- COUNTRY_FROM_DOCUMENT_DOES_NOT_MATCH_COUNTRY_FROM_IP
- EXPECTED_IP_ADDRESS_MISMATCH
- DUPLICATED_IP_ADDRESS (default: Approve)
- DUPLICATED_DEVICE_FINGERPRINT (default: Approve)
## 5. Hard rules — do not change
- Base URL for /v3/* endpoints is verification.didit.me (NOT apx.didit.me).
- Feature enum is UPPERCASE: IP_ANALYSIS, ID_VERIFICATION, LIVENESS, FACE_MATCH, AML.
- Auth header is x-api-key (lowercase, hyphenated).
- Webhook signature header is X-Signature-V2 (NOT X-Signature).
- Always verify webhook signatures before trusting payload data.
- Status casing matches exactly: "Approved", "Declined", "In Review",
"Not Finished" (title-cased, space-separated).
- Always pass vendor_data (your own user id). Without it, every session
is treated as a unique user and DUPLICATED_IP_ADDRESS /
DUPLICATED_DEVICE_FINGERPRINT noise rises sharply.
## 6. Pricing reference (public)
- IP_ANALYSIS as a session add-on: $0.03 per check
- Bundled in a full KYC workflow (ID_VERIFICATION + LIVENESS +
FACE_MATCH + IP_ANALYSIS): $0.33 per session — Device & IP Analysis is
already included at the bundle price.
- 500 free checks every month, forever, on every account.
## 7. Verify your integration
- Sandbox starts on signup at https://business.didit.me — no separate flag.
- Test IPs: deterministic synthetic responses returned in sandbox (Approved
by default; trigger PRIVATE_NETWORK_DETECTED by using a known VPN exit IP
on the verification device).
- Switch to live: flip the application's environment toggle in console.
When in doubt: https://docs.didit.me/core-technology/ip-analysis/overview
每月$0。无需信用卡。
只为您使用的付费。25+ 模块。公开的按模块定价,无每月最低费用。
定制 MSA 和 SLA。适用于大批量和受监管的项目。
免费开始 → 仅在运行检查时付费 → 解锁企业版以获取定制合同、SLA或数据驻留。