Detect and block users creating multiple accounts to exploit your platform. Learn how to use device fingerprinting to connect fake accounts to the same device.
The Problem
Every business with a signup flow faces the same challenge: fraudsters create multiple fake accounts to abuse your system. Whether it's claiming free trials repeatedly, gaming referral programs, or building networks for spam and scam operations, fake account creation costs businesses billions annually.
Traditional defences fail because:
Email verification is trivial to bypass with disposable email services
Phone verification can be defeated with virtual phone numbers
IP blocking fails against VPNs and rotating proxies
CAPTCHA is easily solved by bot farms and AI services
Rate limiting by IP misses distributed attacks
The result: A single fraudster can create hundreds of accounts, each appearing legitimate in isolation.
Common Attack Vectors
Attack Type
Description
Business Impact
Free Trial Abuse
Creating new accounts to extend free trials indefinitely
Lost revenue, skewed metrics
Promo/Coupon Stacking
Using multiple accounts to claim one-time offers repeatedly
Direct financial loss
Referral Fraud
Self-referring between fake accounts to earn bonuses
Inflated CAC, program abuse
Review Manipulation
Fake accounts posting fraudulent reviews
Damaged trust, legal risk
Bonus Abuse
Exploiting sign-up bonuses across multiple accounts
Direct financial loss
Content Spam
Automated account creation for spam distribution
Platform degradation
The Solution: Device-Based Identity
Guardian Stack links accounts to devices, not just credentials. Even when a fraudster uses a new email, phone number, VPN, and incognito mode, they're still using the same physical device — and Guardian detects it.
How It Works
User visits signup page
Guardian SDK silently collects device signals
User submits registration form
Your backend fetches the Guardian event and checks:
Is this device linked to existing accounts?
Is this a bot or automated browser?
Is the user hiding behind a VPN/proxy?
Allow, challenge, or deny registration
Key insight: The visitorId persists across incognito sessions, cleared cookies, and browser restarts. It's cryptographically tied to the physical device.
Implementation Guide
Step 1: Frontend — Capture Device Signals
Install the Guardian JS SDK:
Initialize Guardian when your app loads, then call .get() during registration:
Step 2: Backend — Verify & Decide
Install the Guardian Server SDK:
Create your signup endpoint with fraud checks:
Real-World Examples
Free Trial Abuse Prevention
Scenario: Your SaaS offers a 15-day free trial. Fraudsters create new accounts every 15 days to avoid paying.
Referral Program Protection
Scenario: You offer $20 for each referred user. Fraudsters refer themselves using multiple accounts.
Coupon/Promo Code Abuse Prevention
Scenario: A one-time 50% discount code is being reused across fake accounts.
Database Schema Example
Store Guardian identifiers for long-term fraud detection:
Best Practices
Do
Store visitorId with every account for future cross-referencing
Log fraud attempts without revealing detection methods to users
Use risk scoring for graduated responses instead of hard blocks
Combine signals — a VPN alone isn't fraud, but VPN + incognito + high velocity is suspicious
Review edge cases — legitimate users sometimes trigger signals
Don't
Don't block VPN users outright — many legitimate users use VPNs for privacy
Don't reveal detection methods in error messages (avoid "Bot detected")
Don't rely solely on IP — it's easily changed
Don't ignore velocity — rapid signups from one device indicate automation
Testing Your Implementation
Use these scenarios to verify your fraud detection:
Test Case
Expected Behavior
Normal signup
Account created successfully
Same device, new email
Blocked ("Already have an account")
Incognito mode signup
Slight score reduction, still allowed
VPN + incognito + rapid attempts
Challenge or block
Automated browser (Puppeteer)
Blocked (bot detected)
Anti-detect browser
Blocked (tampering detected)
Conclusion
New account fraud is a persistent threat that traditional verification methods can't solve. By linking accounts to physical devices through Guardian Stack's visitorId, you can:
Stop serial abusers who create multiple accounts
Protect promotional offers from exploitation
Preserve referral program integrity
Reduce manual fraud review with automated detection
Maintain good user experience for legitimate customers
The key insight: fraudsters can change emails, phone numbers, and IP addresses easily — but they can't easily change their physical device. Guardian Stack makes device identity the foundation of your fraud prevention strategy.