Time for a Level Playing Field for Regulated UK Gambling Payments
Download Whitepaper
Fraud & Risk

Velocity Check

What Is a Velocity Check in Payments? Definition and How It Works

Definition

A velocity check is a fraud detection control that monitors the rate at which a specific identifier, such as a card number, IP address, email address, or device, appears in payment transactions over a defined time window, flagging or blocking activity that exceeds a configured threshold.

How it works

Velocity checks operate on the principle that most legitimate cardholders make payments at normal human rates, a few transactions per day, using a consistent set of billing addresses, devices, and email accounts. Fraudulent activity often involves abnormally high transaction rates as attackers attempt to use stolen card data before it is detected and blocked.

A velocity rule specifies an identifier type (card, BIN, IP, email, device ID), an event (authorisation attempt, decline, successful transaction), a count threshold, and a time window. When the count exceeds the threshold within the window, the rule fires, either declining the transaction, flagging it for review, or adding the identifier to a block list.

Attackers adapt to naive velocity rules. A rule blocking a card after 5 attempts in 10 minutes is easily circumvented by distributing attempts across multiple cards, IPs, and time windows. Effective velocity monitoring uses combinations of identifiers, flagging when a single IP submits 50 different cards, or when a single device produces transactions to multiple merchant accounts, to detect distributed attacks that circumvent single-identifier thresholds.

Time window selection affects rule performance: short windows (1 minute) catch burst attacks but miss slow-rolling enumeration. Longer windows (24 hours) catch sustained attacks but may generate more false positives on legitimate high-frequency users such as corporate travel bookers or marketplace platforms with many repeat purchasers.

Why it matters

Velocity rules are the primary defense against card testing: attackers who gain access to card data typically test validity with small-value transactions before using the card for high-value fraud. Velocity rules on authorisation attempts per card and per BIN range are the first line of detection.

False positive risk is significant on high-frequency merchant types: velocity thresholds appropriate for a general retailer may generate high false positive rates for a travel booking platform where the same corporate card books multiple flights in sequence. Thresholds should be calibrated to the merchant's legitimate transaction patterns.

Multi-identifier velocity is more effective than single-identifier: an attacker using one card number per session but operating from the same IP subnet or using the same device fingerprint will evade card-level velocity rules. Cross-referencing velocity across multiple identifiers closes these evasion paths.

Velocity data feeds into fraud score models: velocity signals are high-value inputs to ML-based fraud scoring. Velocity check infrastructure that produces clean, queryable velocity data by identifier enhances model performance beyond what static threshold rules achieve alone.

With PXP

PXP's risk engine supports configurable velocity rules across card, BIN, IP, email, and device identifiers with customizable thresholds and time windows. Velocity data feeds into PXP's ML fraud scoring model. Velocity rule performance can be monitored through the PXP risk dashboard.

Talk to a payments specialist

Frequently asked questions

What identifiers should velocity checks monitor?

At minimum: card number (or token), BIN range, IP address, and device fingerprint. Email address and billing address are also high-value identifiers for detecting the same actor using multiple cards. More sophisticated setups add session ID, browser fingerprint, and shipping address to the velocity monitoring set.

How do merchants avoid blocking legitimate high-frequency users with velocity rules?

Customer segmentation helps: known-good customers with transaction history can be assigned to a lower-risk tier with higher velocity thresholds. Velocity rules should also distinguish between authorisation attempts (which fraudsters produce in high volume during card testing) and successful transactions (which legitimate high-frequency users produce). Blocking on attempt velocity is less likely to catch legitimate users.

What is the difference between a velocity check and a block list?

A velocity check is a dynamic rule that fires when activity crosses a threshold in a time window. A block list is a static list of identifiers permanently (or semi-permanently) blocked from transacting. Velocity checks typically trigger the addition of identifiers to block lists when thresholds are exceeded, so the two controls work together: velocity detection feeds block list maintenance.

How do card testing attacks circumvent basic velocity rules?

Card testing attacks often distribute attempts across many cards (one attempt per card, many cards) to stay below per-card velocity thresholds. They use rotating IPs and device spoofing to evade IP and device velocity rules. Detection requires cross-identifier velocity monitoring, for example, flagging when a single IP submits more than 20 different card numbers in an hour, even if no individual card exceeds its threshold.

Revolutionize your business with PXP

Take complete control of your commerce and payments with one platform.

Get Started