Label Names and IDs
  • 22 Dec 2025
  • 12 Minutes to read
  • Contributors
  • Dark
    Light

Label Names and IDs

  • Dark
    Light

Article summary

=

Display NameID / nameIDCategory (auto-assigned)Disposition (auto-assigned)ContextsDescription
Bonus Abusebonus_abuse4040AbusenegativeConfidence, SourceBonus Abuse is the gaming industry analog of Promo Abuse. An perpetrator signs up multiple times using different identities (often synthetic) to receive the same new customer bonus (free spins, introductory offers, sign-up promos etc).
Click Fraudclick_fraud4050AbusenegativeConfidence, SourceClick Fraud is a type of abuse where the advertising budget of the victim (a business) is deliberately depleted by targeted bot (or script) based attacks.
Fake Listingfake_listing4090AbusenegativeConfidence, SourceFake Listing Abuse occurs when an auction or marketplace listing is created for goods that do not exist. The perpetrator collects the money but does not ship the goods.
Fake Reviewfake_review4020AbusenegativeConfidence, SourceFake Review Abuse involves the posting of fake reviews either by paid individuals, special groups or marketplaces or even traded directly between businesses to falsely boost the profile of legitimate business or legitimize fraudulent online businesses.
Phishing Contentphishing_content4095AbusenegativeConfidence, SourcePhishing is a type of social engineering attack where the perpetrator sends a fraudlent message designed to trick the victim into disclosing sensitive information.
Promo Abusepromo_abuse4010AbusenegativeConfidence, SourcePromo Abuse (also known as discount fraud) occurs when an perpetrator abuses a business's promotional campaigns by using promo codes and discounts multiple times for financial gain.
Reseller Abusereseller_abuse4030AbusenegativeConfidence, SourceReseller abuse is performed by bots at scale, targeting time-sensitive, limited edition, discounted or discontinued stock. The goods obtained are then resold later at a profit because of the exclusive nature of the goods. Ticket sales, fashion, technology and events are often targeted by the perpetrator.
Inbound Spamspam_inbound4070AbusesuspiciousConfidence, SourceInbound Spam occurs when a service or platform is used to send spam content to other users of the service/platform.
Outbound Spamspam_outbound4080AbusesuspiciousConfidence, SourceOutbound Spam occurs when a service or platform is used to send spam outside of the service/platform.
Toxic Content Abusetoxic_content_abuse4060AbusesuspiciousConfidence, SourceToxic Content Abuse is the deliberate posting of offensive text or image content within a social media, forum or group platform. Hate speech, inappropriate images and bullying are all examples of toxic content abuse.
Account Lockaccount_lock8400Authenticationnegative
The account has been locked after a number of failed login attempts or other suspicious behavior.
Challengedchallenged8200Authenticationsuspicious
The user was challenged due to risk.
Challenge Failedchallenge_failed8300Authenticationnegative
The user failed the challenge.
Challenge Passedchallenge_passed8250Authenticationpositive
The user successfully passed the challenge.
Challenge Timeoutchallenge_timeout8350Authenticationsuspicious
The user did not respond to the challenge.
Login Failedlogin_failed8150Authenticationsuspicious
The user failed authentication.
Login Passedlogin_passed8100Authenticationpositive
The user successfully passed authentication.
Self Excludedself_excluded8450Authenticationneutral
Self Exclusion occurs when a user requests that a service not be provided to them.
Fake Crawlerfake_crawler7130BotsuspiciousSource, Crawler FamilyA Fake Crawler bot tries to appear as a real search engine bot by using the same user agent as Google, Yahoo, Bing etc. Fake crawlers often download (or scrape) the entire website content for malicious purposes.
Feed Fetcherfeed_fetcher7020BotneutralSource, Crawler FamilyFeed Fetchers crawl RSS or Atom feeds for news and other information feeds that are requested by app/service users.
Link Checkerlink_checker7080BotneutralSource, Crawler FamilyLink Checkers are tools (often part of SEO) that scan a website to find broken links. Error pages caused by broken links lead to user friction and revenue loss.
Marketing Crawlermarketing_crawler7060BotsuspiciousSource, Crawler FamilyMarketing Crawlers are tools that are used to create screenshots and scrape content for automated competitive analysis and review of marketing trends and brands.
Screenshot Creatorscreenshot_creator7120BotsuspiciousSource, Crawler FamilyScreenshot Creator bots can be used for testing to ensure pages are being displayed correctly. However, Screenshot Creator bots can also be used for as proof that the content being scraped is the same as what is displayed on the page.
Search Engine Crawlersearch_engine_crawler7100BotneutralSource, Crawler FamilySearch Engine Crawlers are good bots that continuously scan the internet, creating search indexes of pages. Search Engine Crawlers will obey robots.txt, XML sitemaps and nofollow tags.
Site Monitorsite_monitor7040BotneutralSource, Crawler FamilySite Monitors periodically check websites to ensure and verify that a website is up and working so that website visitors can use the site as expected.
Speed Testerspeed_tester7070BotneutralSource, Crawler FamilySpeed testing tools are used for performance testing and tuning of websites.
Crawling Toolstools_crawler7050BotneutralSource, Crawler FamilyCrawling Tools are used to optimize search engines, audit websites and scan website health.
Uncategorized Crawleruncategorized_crawler7030BotnegativeSource, Crawler FamilyUncategorized Crawlers are new crawlers that have not yet been categorized. Their behaviour is unknown and therefore pose risk.
Virus Scanner Crawlervirus_scanner_crawler7110BotneutralSource, Crawler FamilyVirus Scanner Crawlers scan websites for suspicious code, malware and viruses.
Vulnerability Scannervulnerability_scanner7090BotneutralSource, Crawler FamilyVulnerability Scanners are automated tools that allow organizations to monitor their networks and applications for security vulnerabilities.
Web Scraperweb_scraper7010BotsuspiciousSource, Crawler FamilyWeb Scraping (web harvesting or web data extraction) is a software technique for extracting information from websites.
ATO - Miscaccount_takeover3170FraudnegativeConfidence, SourceAccount Takeover fraud occurs when the perpetrator gains access to the account through various means (social engineering, stolen credentials or brute force) but does not immediately change passwords or details of the account which might alert the victim.
ATO - Change of Detailsaccount_takeover_change_of_details3100FraudnegativeConfidence, SourceChange of Details Account Takeover fraud occurs when the perpetrator gains access to the account through various means (social engineering, stolen credentials or brute force) and immediately changes the users details, such as shipping address, phone number or even password. This type of attack may draw the attention of the victim who in tern alerts the provider, so these attacks are often very targeted and short-lived in nature. The perpetrators goal is to obtain the maximum financial benefit possible before the victim is alerted to the attack.
ATO - Social Engineeringaccount_takeover_social_engineering3080FraudnegativeConfidence, SourceSocial Engineering Account Takeover occurs when the perpetrator uses one or more Social Engineering attack vectors to trick the victim into providing their account and password information, allowing the perpetrator to take control of the victims account. Attack vectors include Phishing, Scareware, Baiting, Pre-texting and Spear Phishing.
Benefit Theft Fraudbenefit_theft_fraud3150FraudnegativeConfidence, SourceBenefit Theft Fraud is a specific type of First Party Fraud where the perpetrator is knowingly with holding information or deliberately falsifying information in order to claim benefits that they are not entitled to.
Chargeback - Payment Fraudchargebacks_payment_fraud3050FraudnegativeConfidence, SourceChargeback fraud (also known as friendly fraud or "gambler's regret in the gambling industry) denies buying an item on a credit or debit card in order to get a refund from the card provider.
First Party Fraudfirst_party_fraud3010FraudnegativeConfidence, SourceFirst-party fraud is when a person knowingly misrepresents their identity or provides false information for financial or material gain.
Second Party Fraudsecond_party_fraud3020FraudnegativeConfidence, SourceSecond-party fraud is when a person knowingly gives their identity or personal information to another person, for the purpose of committing fraud.
SIM Swapsim_swap_fraud3030FraudnegativeConfidence, SourceSIM swap fraud occurs when a fraudster contacts the victims mobile phone carrier and trick the carrier into activating a SIM card in the possession of the perpetrator, giving them control of the victims phone number. This fraud is commonly performed as a means of bypassing phone based two-factor authentication.
Ghost Brokerghost_broker_fraud3040FraudnegativeConfidence, SourceGhost broking is a type of insurance fraud where the fraudster (aka ghost broker) will pretend to be a genuine insurance broker acting between the victim and a legitimate insurance company. The perpetrator will provide the victim with fake, forged or invalid insurance policies and profit by means of the premium/payment.
Identity Fraud - Stolen Credentialsidentity_fraud_stolen_credentials3060FraudnegativeConfidence, SourceIdentity Fraud with Stolen Credentials is performed by a fraudster or fraud syndicate who have obtained stolen credentials on the darkweb or via other means. The stolen credentials allow access to one or more accounts (such as email address or phone via SIM swap fraud) which is then used to gain access to other accounts and subsequently take control of the victims identity.
Synthetic Identity - Fraudsynthetic_identity_fraud3070FraudnegativeConfidence, SourceSynthetic identity is fraud performed with a combination of fabricated and real identity data to form a synthetic identity that is not associated with a real person.
Money Mule - Money Launderingmoney_mule_money_laundering3090FraudnegativeConfidence, SourceMoney Muling is a type of money laundering. A money mule is a person who receives money from a third party in to their bank account. The money mule either then transfers the money to another bank account or takes the money out in cash and hands it to someone else, effectively "cleaning the money". Money mules help criminal syndicates remain anonymous while transferring the proceeds of cybercrime. Money mules obtain a commission on the amount transferred as an incentive.
Scripted Attack Fraudscripted_attack_fraud3110FraudnegativeConfidence, SourceScripted Attack fraud is performed using bot-scripts. Attacks involve multiple new accounts creating bulk fraudulent orders and the accounts typically disappear immediately following the attack. Scripted Attack fraud is often employed to leverage a known vulnerability and maximize the revenue of the attack before the vulnerability is patched.
Click and Collect Fraudclick_and_collect_fraud3120FraudnegativeConfidence, SourceClick and Collect Fraud targets businesses that offer online purchase with in-store pickup. The perpetrator utilizes stolen card or credentials to complete a purchase online, then collect the goods in-store before the stolen card or credentials are identified. perpetrators deliberately target businesses that do not ask for identification or proof of purchase upon collection.
Subscription Fraudsubscription_fraud3130FraudnegativeConfidence, SourceSubscription Fraud involves signing up to new telecom contracts or services with a valid authorization, but no intent of paying for the products or services. Typically Subscription Fraud involves stolen and occasionally synthetic identities.
Collusive Payment Fraudcollusive_payment_fraud3140FraudnegativeConfidence, SourceCollusion Payment fraud occurs when two or more perpetrators conspire to defraud another participant (the victim, another business) in a digital transaction involving multiple participant groups. In this scenario the perpetrator(s) appear as a legitimate user and one or more legitimate business. The perpetrator purchases goods from a collusive business participant in order to earn cashback reward points. Once the reward points have been consumed, the colluding business participant cancels the purchase and refunds the original sum to the user citing such as unavailability of stock. At this point the cashback rewards are not recoverable.
Claims Fraudclaims_fraud3160FraudnegativeConfidence, SourceInsurance Claims Fraud generally falls into a few categories, from unintentional, opportunistic through premeditated deliberate fraud. The perpetrator gains a financial advantage by defrauding the insurer via claims where there has been no actual loss.
Trusted Identitytrusted_identity9100IdentitypositiveConfidence, SourceA Trusted Identity has been manually verified as a legitimate user. Typically this is Added and Checked against multiple Identifiers.
Data Breachdata_breach9200IdentitysuspiciousConfidence, SourceA Data Breach is occurs where personal information of users is lost, stolen or taken without authorization. This not only results in damage to the target companies reputation, but also often identity theft and financial loss for the victims whose information is stolen.
Identity Theftidentity_theft9300IdentitynegativeConfidence, SourceIdentity Theft is the use of stolen personal identifiying information by a perpetrator to commit fraud or other crimes.
Allow Listallow_list1100Listspositive
An Allow List is used to bypass fraud or abuse decisioning that result in false positives. This is often used as a temporary, immediate fix until the decisioning can be updated to prevent the false positive.
Block Listblock_list1200Listsnegative
A Block List is used to block Identifier attributes that are almost always associated with fraudulent or abusive behaviour. The financial or security risk greatly outweighs the benefits of allowing the event to proceed.
Watch Listwatch_list1300Listssuspicious
A Watch List is used to monitor the behaviour of suspicious Identifier attributes that are currently suspected of fraud, abusive or other undesired behaviour.
Monitor Listmonitor_list1400Listsneutral
A Monitor List is used for passive monitoring of specific Identifier attributes for logging, reporting, analysis, investigative  or compliance purposes. The fact that an identifier is on a Monitor List should not impact any fraud, abuse or other decision made in relation to the identifier.
VIP Listvip_list1500Listspositive
A VIP List is used to streamline important/frequent customers from friction that occurs as a result of false positives. Only verified, well known customers with no history of fraud or account takeover should be added to the VIP List.
Onion Routeronion_router6010RisksuspiciousSourceAn Onion Router is part of the TOR network, routing traffic from one node to the next. Whilst TOR traffic does not exit from the router node onto the internet, the fact that a routing node is performing events is suspicious.
TOR Exit Nodetor_exit_node6020RisknegativeSourceA TOR exit node is the last node that traffic passes through in the TOR network before exiting onto the internet. The TOR network's intended purpose is to protect the users privacy, freedom and ability to communicate confidentially. This anonymity is frequently abused by cybercriminals and fraudsters to make their activities untraceable.
Anonymous Proxyanon_proxy6030RisksuspiciousSourceAnonymous Proxies identify themselves as a proxy service to the web server, but do not disclose or leak the IP address of the user. Anonymous proxies are often paid services used legitimatley by people wanting to keep their identity and activity hidden. Anonymous proxies are sometimes utilized by hackers and cyber criminals to help cover their tracks.
Open SOCKS Proxyopen_socks_proxy6040RisksuspiciousSourceUnlike an Open Proxy, an Open SOCKS Proxy enforces data security via encrypted tunnelling and the user of the proxy is less likely to have their information stolen. However the fact that the proxy is open means that anyone on the internet can connect to and freely use the proxy. Hackers and cybercriminals use open proxies to hide their identity when performing attacks.
Bitcoin Nodebitcoin_node6050RisksuspiciousSourceA Bitcoin Node is constantly running the Bitcoin Core, storing the entire blockchain and also processing new transactions as they happen.
CGI Proxycgi_proxy6060RisknegativeSourceCGI (Common Gateway Interface) Proxies are a type of anonymous proxy that provides its service via web forms. Because the CGI proxy is web-based, it allows users to bypass proxy detection. This also poses a great risk for the user of the CGI proxy, as all of the password and sensitive information entered is often written direct to web logs that the CGI proxy operator can access.
Open Proxyopen_proxy6070RisknegativeSourceMost open proxy servers are run by hackers and cybercriminals in order to steal logins, identity and credit card data. In some cases the webpages and javascript is modified on its way through the open proxy in order to collect additional identity information or perform attacks from the victims device to cover their tracks.
Web Attackweb_attack6080RisknegativeSourceAttack Sources scan websites for vulnerable web application and also attempts brute force logins.
SSH Attackssh_attack6090RisknegativeSourceSSH Attack Sources run attacks against SSH services attempting to find and exploit vulnerabilities.
Mail Attackmail_attack6100RisknegativeSourceSSH Attack Sources run attacks against Mail, SMTP, IMAP and POP3 services attempting to find and exploit vulnerabilities.
Anonymous VPN Serviceanon_vpn_service6110RisksuspiciousSourceCommercial Anonymizing VPN services are used by customers who which to keep their identity anonymous. Cybercriminals and hackers may also use commercial VPN services to cover their tracks.
VoIP Fraudvoip_fraud6120RisknegativeSourceVoIP fraud occurs when the perpetrator use VoIP services with no intention of paying for them
Cybercrimecybercrime6130RisknegativeSourceCybercrime is any criminal activity that is carried out using computers, networked devices or a network.
Malwaremalware6140RisknegativeSourceMalware is malicious software that is designed to harm or exploit devices, services or networks.
Bot Abusebot_abuse6150RisknegativeSource
Cookie Copyingcookie_copy7070RisknegativeSourceCookie Copying occurs when the perpetrator obtains a browser cookie from the victims device and then uses that browser cookie value on their device in order to impersonate the victim, taking control of their web session.
Schema Validatedschema_validated5020Securitypositive
The API payload was successfully validated against the schema.
Schema Violationschema_violation5030Securitynegative
The API payload failed validation against the schema.
Additional Payloadadditional_payload5040Securitysuspicious
The API payload contains additional data that is not part of the schema.
Incorrect Format Dataincorrect_format5050Securitysuspicious
The API payload contains incorrectly formatted data.
False Positivefalse_positive2100Truth Data/ReviewpositiveConfidenceA false positive was generated by a model.
False Negativefalse_negative2200Truth Data/ReviewnegativeConfidenceA false negative was generated by a model.
Operator Review Passedoperator_review_passed2300Truth Data/ReviewpositiveConfidenceThe event has passed manual review by an operator after being marked for review by the workflow.

Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence