Fraud & Risk
Glossary Velocity Checks

Velocity Checks

Also Known As: Velocity Limits Velocity Rules Transaction Velocity Controls Velocity Filters
Used By: Merchants Payment Gateways Processors Compliance & Risk Teams
What is Velocity Checks?

Velocity checks are fraud prevention controls that monitor the rate at which specific identifiers — such as a card number, email address, IP address, or device fingerprint — appear in transaction attempts over a defined time window. When the number of attempts associated with a given identifier exceeds a configured threshold within that window, the velocity check triggers a flag, a challenge, or an automatic decline depending on how the rule is configured.

Velocity checks are designed to detect and stop automated fraud attacks, card testing, and account takeover attempts that rely on submitting large numbers of transactions in rapid succession. Legitimate cardholders rarely trigger velocity limits because normal spending behavior does not involve dozens of transaction attempts from a single identifier within minutes or hours.

Velocity rules are configured by merchants and gateways based on their specific transaction patterns and fraud risk profile. Thresholds that are too aggressive block legitimate transactions. Thresholds that are too permissive allow fraud to pass through. Calibrating velocity rules requires ongoing analysis of transaction data and fraud patterns.

Diving Deeper into Velocity Checks

Velocity checks are one of the most fundamental and widely deployed fraud prevention controls in payments. They operate on a simple premise: fraudulent activity involving stolen payment credentials tends to happen in bursts, with automated systems attempting many transactions in rapid succession, while legitimate cardholder behavior is distributed over time and does not spike in the same way. By monitoring transaction rates rather than just individual transaction characteristics, velocity checks catch fraud patterns that would be invisible to rules evaluating each transaction in isolation.

What Velocity Checks Monitor

Velocity checks can be applied to any identifier that appears consistently across transactions. The most effective velocity controls monitor multiple identifiers simultaneously, since sophisticated fraudsters may vary some identifiers while reusing others.

Card Number Velocity

Monitoring how many times a given card number appears in transaction attempts within a time window is the most direct velocity check. A card number that appears in twenty authorization attempts within ten minutes is almost certainly being tested by a fraudster verifying whether it is active before using it for larger purchases. Legitimate cardholders do not generate this pattern.

Email Address Velocity

Monitoring transaction attempts associated with a specific email address catches fraudsters who reuse email addresses across multiple card numbers. An email address associated with ten different card numbers within an hour is a clear fraud signal, even if each individual card number has only been seen once.

IP Address Velocity

Monitoring transactions originating from a single IP address is effective for detecting automated fraud attacks launched from a specific location. A single IP address submitting hundreds of transaction attempts within minutes signals an automated attack regardless of how many different card numbers or email addresses are involved.

Device Fingerprint Velocity

Device fingerprinting creates a profile of the device used to initiate a transaction based on browser characteristics, screen resolution, installed fonts, and other attributes. Monitoring velocity by device fingerprint catches fraudsters who vary their IP address or email but use the same device, as well as identifying devices associated with previous fraud attempts.

BIN Velocity

Monitoring the rate at which cards from a specific BIN, the bank identification number that identifies the issuing bank and card type, appear in transaction attempts can identify attacks targeting a specific card portfolio. When a particular issuer’s cards are suddenly appearing at unusually high rates, it may indicate that a data breach exposed that issuer’s card data and fraudsters are testing or monetizing it.

Card Testing Attacks

Velocity checks are the primary defense against card testing, one of the most common and damaging fraud attack types that merchants face.

Card testing occurs when a fraudster obtains a batch of stolen card credentials — typically from a data breach or dark web purchase — and needs to verify which cards are still active and have available balances before using them for high-value fraud. The fraudster submits small-value transactions, often one dollar or less, to verify card status without triggering significant financial loss alerts.

A single card testing attack can involve thousands of transaction attempts within a short period. Without velocity controls, each test transaction appears as a low-risk small purchase and would likely pass standard fraud scoring. Velocity checks identify the abnormal rate of attempts and block the attack before significant damage occurs.

Configuring Velocity Rules

Effective velocity rule configuration requires understanding the merchant’s normal transaction patterns so that thresholds can be set appropriately above normal variation but below fraudulent attack levels.

Time Windows

Velocity rules are defined over time windows that can range from minutes to hours to days. Short windows catch rapid automated attacks. Longer windows catch slower, more distributed fraud patterns. Most effective implementations use multiple rules with different time windows simultaneously — a short window for catching card testing attacks and longer windows for catching more distributed fraud patterns.

Thresholds

Threshold setting is the most consequential configuration decision in velocity rule design. A threshold set too low generates excessive false positives that block legitimate customers. A threshold set too high allows fraud to pass. Threshold calibration requires analyzing historical transaction data to understand normal velocity distributions and setting thresholds above the normal range but below observed fraud attack levels.

Actions

Velocity rule actions range from flagging a transaction for manual review to automatically declining it. For high-confidence fraud signals like extremely high card number velocity, automatic decline is appropriate. For more ambiguous signals, flagging for review or requiring additional authentication such as 3D Secure allows the merchant to take a measured response without automatically blocking potentially legitimate transactions.

Shopping Basket