Block fake leads and fraud sign-ups

Our cloud API identifies phishers, bots, spammers, fraudsters, and high-risk users and links lead quality to marketing performance.

Real-time Intelligence

Get answers to questions such as:

  • Is the email real, associated with spam or fraud?
  • Is the IP a bot, TOR, proxy, or blacklisted?
  • Is the domain new, risky, or parked with ads?
  • Is the device linked to fraudulent activity?
  • Is this user trying to create multiple accounts?
  • Is the activity pattern suspicious?
  • Is this user tagged a fraudster from other web sites?

E-HAWK performs thousands of these risk checks in real-time giving you detailed insight, actionable information, and improving your fraud stack and cyber crime detection.

Learn more

Responsive image

Stop Bogus Sign-ups

Free trials and registrations are a great way to attract new users into your online community. But many are fake. Some are trying to use your platform for phishing, sending out spam, identity theft, and fraud.

E-HAWK can automatically filter out many bad actors, so you can focus your time taking care of your good clients and building your business.

Lead Vetting and Scoring

Real leads are gold. Invalid or fraud leads are impossible to reach and often a waste of time. Why not use our pre-built tests to check for issues with emails, locations, IPs, phones, domains, etc. before investing marketing resources and sales efforts?


Marketing Performance Tracking

Real-time performance results for marketing campaigns and lead sources. Track which campaigns and lead sources deliver the most qualified prospects. Stop buying leads from poor performers, and improve click through results.

Responsive image

Connect Web Lead, Sign-Up Forms, and CRM

Use Zapier to add lead scoring to any CRM. Or try the Sign-up Form Connector to quickly integrate with online forms for leads, newsletter signups, free trials, or account creations.

Project Image

Fight Account Takeovers

E-HAWK monitors login activity for suspicious behavior such as IP movement velocity, changes in IP, email, and device fingerprint risks.

In addition, our community data will tag users who have been terminated by other online services, blacklisted, or have a compromised device.

Customize Scoring

Because each organization views risk differently, you can quickly increase or decease scoring for risk hits.

Tagging items empowers your company to score specific emails, domains, IPs, and device fingerprints as good, bad, or bypass scoring.

Custom Scoring

Customize Scoring

Tag Items

Tag Items

Detailed Reporting

The portal provides dashboard views and interactive charts to quickly evaluate risk levels and trends in real-time. Click on any chart or risk type to drill-down and see detailed risk profiles of each lead.

It is easy to monitor percent of high-risk leads, who they are, and how risk areas and threats are trending.

Learn more


Get Started

Our API cloud service is easy to implement. Request a free trial account to get your APIKEY. Then use the online documentation and sample code to start vetting. Questions or need help? Just email support.