Skip to content
Create account
or
Sign in
The Stripe Docs logo
/
Ask AI
Create account
Sign in
Get started
Payments
Finance automation
Platforms and marketplaces
Money management
Developer tools
Get started
Payments
Finance automation
Get started
Payments
Finance automation
Platforms and marketplaces
Money management
OverviewExplore all products
Start building
Start developing
Sample projects
About the APIs
Build with LLMs
Use Stripe without code
Set up Stripe
Create an account
Web Dashboard
Mobile Dashboard
Migrate to Stripe
Manage fraud risk
Understand fraud
Radar fraud protection
    Overview
    Integration
    Radar Session
    Risk evaluation
    Multi-processor Radar scores
    Risk settings
    Reviews
    Lists
    Rules
      Reference
      Supported attributes
      Test rules
      Dispute resolution rules
    Radar analytics
    Radar for Platforms
Manage disputes
Verify identities
HomeGet startedRadar fraud protectionRules

Testing Stripe Radar

Use the following information to test your fraud prevention strategy.

Copy page

Use the following test credit card numbers to create payments in a sandbox environment with a specific risk level. Create test payments in either the Stripe Dashboard (in a sandbox) or by calling create a charge with your test API key.

NumberDescription
Results in a charge with a risk level of highest, but could be blocked depending on the rules you have in place (for example, payments made with this card aren’t blocked if the Block if :risk_level: = 'highest' rule is disabled).
Results in a charge with a risk level of highest, and is always blocked regardless of your rules.
Results in a charge with a risk level of elevated.

Rules

Before you add or update a rule, we’ll search for historical live mode payments that match the rule criteria. You can inspect that list of payments to verify the criterion’s intended behaviour, and we also summarise those search results to help you estimate its future impact.

For each rule you test, the summary includes the volume and number of payments that fall into the following categories:

  • Disputes and early fraud warnings: Payments that received a dispute or an early fraud warning (EFW).
  • Refunded payments: Payments that were refunded.
  • Blocked and failed payments: Payments that were either blocked by Radar, blocked by Stripe, or declined by issuers.
  • Succeeded payments: Payments that are successfully processed and haven’t yet been identified as fraudulent nor refunded.

Additionally, when you test allow rules, you can also see Overrides. This refers to payments that Radar blocks due to high risk of fraud or a custom block rule, but now will be allowed by your proposed rule. In the Dashboard, you can see further breakdowns of these summary metrics. For example, you can see refunds that are classified as fraudulent.

Screenshot that shows the potential impact a custom rule could have

Review the sample questions in the following table to help you decide if you can implement your rule.

Caution

It’s uncommon to find a perfect rule that only blocks fraudulent payments or only allows good payments. Thus, your decision to implement a rule is typically based on a trade-off. Consider if this rule will block enough fraudulent payments to be worthwhile compared to any valid payments it might incorrectly block. The trade-off that’s right for you depends on the particulars of your business. For more information, see our fraud detection primer.

Rule typeImplement this rule if…
Block
  • It matches payments that were disputed, received an EFW, or refunded as fraud at the cost of an acceptable amount of legitimate payments for your business.
  • It matches refunds and you’re trying to save operational burden and prevent refund abuse.
  • It matches payments that failed because issuers declined the payment. Sometimes, issuers might decrease auth rates for you if you send a high number of transactions that fail (For example, if a business experiences a large amount of Card Testing).
Review
  • It matches payments that were disputed, received an EFW, or refunded as fraud. It prompts your team to closely evaluate potential fraudulent transactions or other suspicious payment activities.
Request 3DS
  • It matches payments that were disputed, received an EFW, or refunded as fraud at the cost of an acceptable amount of legitimate payments for your business. Note: 3DS does not always guarantee that your user will receive a challenge. This means while you might get liability shift if a fraudster passes frictionless 3DS and commits fraud, you might still receive an EFW (which ultimately can lead to identification in VFMP).
Allow
  • It matches an acceptable amount of previously blocked payments that you have a high degree of certainty should be safe for your business. Allow rules are somewhat trickier to evaluate because there’s no way of knowing which previously-blocked charges would, if allowed, have turned out to be fraudulent. So, with these rules, it’s particularly important to review the list of matching historical payments to ensure these are payments you’d like to allow.
  • It doesn’t match a lot of Overrides. This indicates that you are letting through high risk payments.
Was this page helpful?
YesNo
Need help? Contact Support.
Join our early access programme.
Check out our changelog.
Questions? Contact Sales.
LLM? Read llms.txt.
Powered by Markdoc