Back to Insights
ArticleBanking & Fintech

10 Fraud Scoring Rules for Card-Not-Present Transactions

Card-not-present (CNP) fraud costs merchants $11...

Finantrix Editorial Team 6 min readAugust 17, 2025

Key Takeaways

  • Velocity-based rules catching multiple transactions from the same card within short timeframes are the most effective starting point for CNP fraud detection
  • Geographic mismatches between IP location, billing address, and shipping address provide strong fraud signals when properly configured with distance thresholds
  • Device fingerprinting and behavioral analysis can identify sophisticated fraud attempts that bypass traditional payment validation methods
  • Email domain analysis and BIN range risk assessment require regular updates through threat intelligence feeds to maintain effectiveness
  • Implement progressive risk scoring with multiple threshold levels rather than binary approve/decline decisions to balance security with customer experience

Card-not-present (CNP) fraud costs merchants $11.5 billion annually in the US alone, with e-commerce transactions accounting for 81% of all card fraud. Unlike card-present transactions that rely on chip authentication, CNP transactions depend entirely on data validation and behavioral analysis. Effective fraud scoring requires rules that evaluate transaction patterns, device fingerprints, velocity checks, and cardholder behavior across multiple data points.

These ten fraud scoring rules provide a framework for detecting suspicious CNP activity while minimizing false positives that block legitimate customers. Each rule includes specific threshold recommendations based on industry benchmarks and can be implemented through most payment gateways and fraud management platforms.

1. Velocity-Based Transaction Monitoring

Multiple transactions from the same card within short timeframes signal potential fraud testing or account takeover. Configure velocity rules to flag cards with more than 3 transactions in 10 minutes, 5 transactions in 1 hour, or 10 transactions in 24 hours. Include both successful and declined attempts in velocity calculations, as fraudsters often test multiple cards or authorization limits. Set separate thresholds for different merchant categories—digital goods typically see higher legitimate velocity than physical products.

73%of CNP fraud involves velocity testing

2. Geographic Mismatch Detection

Compare billing address, shipping address, and IP geolocation to identify inconsistencies that suggest fraudulent activity. Flag transactions where the IP country differs from both billing and shipping countries, or where shipping addresses are more than 100 miles from the billing ZIP code for domestic transactions. International shipping to high-risk countries (based on your merchant category) should trigger additional verification steps. Maintain whitelists for customers with established international shipping patterns to reduce false positives.

3. Device Fingerprinting and Recognition

Track device characteristics including browser type, screen resolution, operating system, and installed plugins to identify suspicious device behavior. Flag first-time devices making high-value purchases, devices associated with multiple payment cards, or devices showing characteristics of fraud tools (headless browsers, virtual machines, or known proxy services). Implement progressive risk scoring where established devices receive lower risk scores, while new or suspicious devices trigger additional authentication requirements.

4. Time-of-Day and Day-of-Week Analysis

Fraudulent transactions often occur outside normal business hours when customer service is unavailable for verification calls. Score transactions higher if they occur between 2 AM and 6 AM in the cardholder's time zone, or during weekends and holidays when banks have limited fraud response capabilities. Adjust these rules based on your customer base—entertainment merchants may see legitimate late-night activity, while B2B merchants typically see business-hours transactions.

⚡ Key Insight: Combine time-based rules with customer history. A customer who regularly shops at 3 AM should not be flagged, but a new customer making their first purchase at this time warrants additional scrutiny.

5. Email Domain and Age Verification

Analyze email addresses for fraud indicators including disposable email services, recently created domains, and suspicious patterns. Flag transactions using email addresses from known temporary email providers (10MinuteMail, Guerrilla Mail, Mailinator), domains registered within the past 30 days, or email addresses following fraud patterns (random character strings, sequential numbers). Cross-reference email domains against lists of compromised or high-risk providers updated regularly through threat intelligence feeds.

6. BIN (Bank Identification Number) Range Analysis

Different card types and issuing banks have varying fraud rates, requiring risk-adjusted scoring based on BIN ranges. Prepaid cards, gift cards, and cards from certain countries show higher fraud rates and should receive elevated risk scores. Monitor your transaction data to identify BIN ranges with high chargeback rates specific to your merchant category. Update BIN risk tables monthly using data from card networks and fraud prevention services.

7. Purchase Pattern Anomaly Detection

Compare current transaction amounts and product categories against the cardholder's historical purchasing behavior. Flag purchases that exceed 3x the customer's average order value, transactions for product categories the customer has never purchased, or sudden shifts to high-value items after a pattern of small purchases. For new customers, compare against similar demographic cohorts or flag all first-time high-value purchases for manual review.

8. Shipping Address Validation and Risk Assessment

Validate shipping addresses against postal databases and assess delivery location risk factors. Flag addresses that fail Address Verification Service (AVS) checks, ship to mail forwarding services, use incomplete or obviously fake information, or deliver to high-risk locations (vacant lots, industrial areas for consumer goods). Implement separate rules for digital goods that don't require shipping but may use fake billing addresses.

CNP fraud rules must balance security with customer experience, as overly aggressive scoring can block legitimate customers and reduce conversion rates.

9. Payment Method and Card Data Analysis

Examine payment card details for indicators of compromised or fraudulent cards. Flag cards that fail CVV verification, show BIN/country mismatches, or appear on negative databases from previous fraud incidents. Include luhn algorithm validation to catch basic card number errors, and cross-reference card ranges against known compromised batches. Score transactions higher when customers provide minimal card information or skip optional verification fields.

10. Social Engineering and Behavioral Indicators

Monitor for behavioral patterns that suggest social engineering attacks or account takeover attempts. Flag rapid changes to account information (email, password, shipping address) followed immediately by purchases, multiple failed login attempts before successful transactions, or sudden increases in spending after dormant periods. Include session behavior analysis such as unusual mouse movements, rapid form completion, or copy-paste patterns that suggest automated tools.

Did You Know? Account takeover fraud increased 131% year-over-year in 2023, making behavioral analysis increasingly critical for detecting compromised legitimate accounts.

Implementation Considerations

Deploy these rules through a risk-scoring engine that assigns weighted scores rather than binary accept/reject decisions. Establish score thresholds for different actions: 0-30 (approve automatically), 31-70 (require additional verification), 71-100 (manual review or decline). Test rule effectiveness using historical transaction data to optimize thresholds and weights before live deployment.

Monitor rule performance continuously through key metrics including false positive rates, detection accuracy, and impact on conversion rates. A well-configured CNP fraud scoring system should achieve detection rates above 85% while maintaining false positive rates below 2% for established customers.

Consider implementing machine learning models alongside these rules to adapt to evolving fraud patterns, but maintain rule-based systems as the foundation since they provide explainable decisions required for dispute resolution and regulatory compliance.

📋 Finantrix Resource

For a structured framework to support this work, explore the Retail Banking Business Architecture Toolkit — used by financial services teams for assessment and transformation planning.

Frequently Asked Questions

What's the difference between CNP fraud rules and machine learning fraud detection?

CNP fraud rules are explicit, configurable logic statements that evaluate specific transaction attributes against predetermined thresholds. Machine learning models identify patterns in data automatically but provide less transparency in decision-making. Most effective fraud systems use both approaches—rules for known fraud patterns and ML for emerging threats.

How often should fraud scoring rules be updated?

Review rule performance monthly and update thresholds quarterly based on fraud trends and false positive rates. Critical rules like BIN ranges and email domain lists should be updated weekly or daily through automated feeds. Major rule changes should be A/B tested before full deployment.

What fraud detection accuracy should I expect from these rules?

Well-implemented CNP fraud rules typically achieve 80-90% detection rates with false positive rates of 1-3%. Performance varies significantly based on merchant category, average order value, and customer demographics. E-commerce merchants usually see better results than digital goods merchants.

Can these rules be implemented in any payment gateway?

Most major payment gateways support custom fraud rules through their risk management interfaces. However, rule complexity and real-time data access vary by provider. Advanced rules requiring device fingerprinting or behavioral analysis may need third-party fraud prevention services.

How do I balance fraud prevention with customer experience?

Implement progressive friction—low-risk transactions process automatically, medium-risk require additional verification (CVV, 3DS), and high-risk go to manual review. Use customer history to reduce friction for established buyers and provide clear communication when additional verification is needed.

Card-Not-Present FraudFraud ScoringPayment FraudFraud Detection RulesCNP Fraud
Share: