Skip to content
Create account or Sign in
The Stripe Docs logo
/
Ask AI
Create accountSign in
Get started
Payments
Revenue
Platforms and marketplaces
Money management
Developer resources
APIs & SDKsHelp
OverviewAccept a paymentUpgrade your integration
Online payments
OverviewFind your use case
Use Payment Links
Use a pre-built checkout page
Build a custom integration with Elements
Build an in-app integration
Use Managed Payments
Recurring payments
In-person payments
Terminal
Payment Methods
Add payment methods
Manage payment methods
Faster checkout with Link
Payment operations
Analytics
Balances and settlement time
Compliance and security
Currencies
Declines
Disputes
Radar fraud protection
    Overview
    How Radar works
    Optimise fraud signals
    Capture fraud data
    Risk evaluations
    Customer abuse evaluation
    Multi-processor Radar scores
    Risk controls and settings
    Reviews
    Lists
    Rules
    Local payment methods
    Radar analytics
    Radar for Platforms
    Understand fraud
Payouts
ReceiptsRefunds and cancellations
Advanced integrations
Custom payment flows
Flexible acquiring
Off-Session Payments
Multiprocessor orchestration
Beyond payments
Incorporate your company
Crypto
Agentic commerce
Machine payments
Financial Connections
Climate
Verify identities
United States
English (United Kingdom)
  1. Home/
  2. Payments/
  3. Radar fraud protection

Risk controls

Adjust how aggressively you block fraud for your business with Radar for Fraud Teams.

Stripe Radar lets you choose a risk setting that automatically adjusts your protection thresholds based on your business needs and tolerance. Based on the risk setting you choose, we recommend the risk controls that help protect against fraud.

Risk settings

Risk settings let you balance authorization and fraud on your account by using risk controls. These risk controls set different thresholds to block payments that might result in fraudulent disputes or early fraud warnings. Certain risk settings also recommend that you enable or disable additional risk controls, such as adaptive 3DS, to help protect your account from fraud while allowing non-fraudulent payments.

On the risk controls page, you can choose or modify your risk setting from the options below. You might need to upgrade your plan to adjust your risk setting.

  • Maximize protection: Prioritize protecting your business against fraud by blocking payments that are likely to receive early fraud warnings.
  • Balance risk and revenue: Balance protecting your business against fraud with tolerating some risk.
  • Maximize revenue: Prioritize revenue by blocking high-risk payments, which can help minimize losses because of fraud.

When you change your risk setting, the modal displays the impact to payments with the following statistics. The numbers shown are estimated projections based on your last four months of payment data.

MetricDescription
FraudThe estimated payments this setting blocks before they become fraudulent disputes or early fraud warnings.
PaymentsThe estimated payments and percentage change your business accepts, based on what this setting allows.

Adjust your blocking preference using risk settings

Beginning March 1, 2026, existing Radar for Fraud Teams users can change blocking preferences using risk settings, instead of the default risk thresholds. If you previously set a risk score block threshold, the Block if :risk_level: = 'highest' default rule is likely still enabled. If this is the case, you won’t see the option to change your risk score threshold on the risk controls page.

If you want to change your default block threshold, you can do either of the following:

  • (Recommended) Modify your risk setting. Changing your risk setting alters the enabled risk controls and the thresholds set for each control. Each risk control uses individualized machine learning to improve cost and fraud protection on your behalf. When you first enable a risk setting, Stripe disables the corresponding high risk block rule that uses risk score.
  • (Legacy) For users on Radar for Fraud Teams, you can still write custom rules on the risk score, but we don’t recommend this method for most users.

Risk controls

Risk controls use AI to protect your account. You enable them on your account to block payments that might result in fraudulent disputes or early fraud warnings. Risk settings determine which risk controls are enabled and recommend additional risk controls, such as adaptive 3DS.

Risk settings automatically manage the blocking thresholds for risk controls, so you can’t adjust a threshold manually. To block more or less traffic from a risk control, you can change your risk setting, which automatically changes the blocking threshold for the risk control, but doesn’t allow you to select your own threshold.

Risk controls and risk settings won’t override the custom rules you created. You can continue to update your controls, settings, and rules at any time.

You can find the following controls on the risk controls page in the Dashboard.

Fraudulent dispute

This risk control dynamically blocks payments that are likely to result in fraudulent disputes. Radar determines the number of payments to block versus accept based on your risk setting, and maximizes conversion while preventing the risk of entering monitoring programs.

To change how much this control blocks, change your risk setting.

Early fraud warning

This risk control determines which payments are likely to result in an early fraud warning. Radar determines the threshold based on your risk preferences, and maximizes conversion while preventing the risk of entering monitoring programs.

This control is only available if you choose the Maximize protection risk setting. We recommend turning on this setting if you’re in a card brand monitoring program, which counts early fraud warnings toward the VAMP monitoring program.

Adaptive 3DS

Radar’s adaptive 3D Secure (3DS) authentication control adds an extra layer of authentication during checkout to help protect against fraud. Stripe runs machine learning in the background to authenticate medium-risk payments.

In most cases, 3DS authentication happens with no action required by your customer. If the customer’s bank detects anything unusual, they might ask the customer to confirm their identity through a security challenge. If 3DS authenticates a payment, the liability for any fraud-related disputes for that payment typically shifts from your business to the issuer. This means that in most cases, the seller isn’t responsible for fraud costs on 3DS-authenticated payments.

Stripe activates 3DS automatically, if required by a regulatory mandate such as Strong Customer Authentication (SCA). Disabling adaptive 3DS doesn’t prevent 3DS from activating when required for compliance. Authentication fraud prevention control isn’t available in testing environments.

Risk score Deprecated

Stripe Radar gives each payment a numerical risk score between 0 and 99, where 0 is the lowest risk and 99 is the highest. This risk score is the probability that a payment results in a fraudulent dispute or early fraud warning.

Note

Adjusting the risk score applies to card, ACH, and SEPA Direct Debit payments. You can select a specific payment method to test different thresholds and view affected payments.

Block payments

Radar is deprecating the high risk block rule that uses risk score to block payments. To change your block preference, you must use risk settings, which use separate models to block payments. When you select a risk setting, your default high risk block rule is disabled and you can’t re-enable it.

If you use Radar for Fraud Teams and want to block payments based on the risk score (even after selecting a risk setting) you can continue writing custom rules on :risk_score:.

See also

  • Access risk evaluations
  • Review card payments
  • Optimize fraud signals
Was this page helpful?
YesNo
  • Need help? Contact Support.
  • Chat with Stripe developers on Discord.
  • Check out our changelog.
  • Questions? Contact Sales.
  • LLM? Read llms.txt.
  • Powered by Markdoc
On this page