Skip to main content

Identify Fraud Networks from a Single Customer

Getting Started with Bespot Gatekeeper

Bespot Customer Support Team avatar
Written by Bespot Customer Support Team
Updated over 2 months ago

The Investigations tab helps you uncover hidden connections between users, devices, and transactions.

With just one customer or device ID, you can visualize entire fraud networks, detect coordinated activity, and export your findings for deeper analysis.

In this article, you’ll learn how to:

  • Run an investigation using a customer or device ID

  • Configure time ranges and analysis depth

  • Review key insights and network metrics

  • Explore user and device relationships through the Relationship Explorer graph

  • Identify suspicious time correlations

  • Export data to CSV or Excel for further review

Step-by-step guide

  1. Open the Investigations tab
    Access it from the main Gatekeeper dashboard.

  2. Enter a customer or device ID
    You can paste or search for any known IDs to begin. Multiple IDs are supported.

  3. Set the analysis depth and time range
    Choose how many relationship layers to explore and the timeframe to analyze.

  4. Review key insights
    See top metrics like location diversity, device types, and average fraud scores.

  5. Explore the Relationship Explorer graph
    Visualize how users and devices connect, highlighting shared usage patterns and anomalies.

  6. Export your results
    Download as CSV or Excel for offline review or sharing with your team.

Example use cases

  • Detecting multiple accounts linked to the same device

  • Investigating shared payment or location fingerprints

  • Uncovering coordinated activity during specific time windows

Did this answer your question?