Skip to main content
Didit ships a curated library of over 150 preset transaction-monitoring rules that are automatically created the moment you enable transaction monitoring on an application. Each rule maps to a real-world AML, fraud, or compliance typology drawn from global standards and regulatory guidance — FATF recommendations, FinCEN advisories, NACHA rules, Wolfsberg principles, and Egmont Group typologies. You can keep the defaults, tune thresholds, switch a rule to test mode, or disable it. Preset rules cannot be deleted (they reappear if removed) but they can always be overridden with custom rules.
Rule configuration is console-only. All rule tuning — thresholds, conditions, actions, mode — happens from Transactions → Rules → Library in the Business Console. For an end-to-end walkthrough of how rules contribute to scoring, see risk scoring.

How presets are organised

Every preset belongs to a bundle (its functional family) and a category (its broader risk theme). Bundles let you toggle related rules together from the console; categories drive scoring and reporting.
BundleWhat it covers
financeStructuring, large transactions, cumulative volume, country spread, layering, mule fan-in, smurfing
aml_ctfSanctions, PEP, suspicious payment references, round-amount layering, rapid in-and-out
aml_monitoringBlockchain-derived high-risk source-of-funds exposure, terrorist financing, child exploitation
anomaly_detectionHigh velocity, dormant reactivation, off-hours activity
fatfHigh-risk jurisdiction exposure
device_intelligenceDevice fingerprint reuse, multi-fingerprint accounts, IP/browser anomalies, VPN/proxy, impossible travel
fraud_prevention_multi_accountingShared fingerprints across distinct subjects
fraud_prevention_appAuthorised push payment / first-time payee / scam victim signals
fraud_prevention_atoAccount takeover composite signals (PII change, new payment method)
fraud_prevention_consortiumCounterparties flagged by other institutions in the shared network
crypto_monitoringMixer/darknet/sanctioned wallet exposure, chain hopping, unhosted wallets, VASP gaps
travel_ruleGlobal and regional Travel Rule obligations (12 regimes)
responsible_gamingSafer-play deposit/withdrawal limits, self-exclusion, off-hours play
e_commerceCard testing microtransactions, chargeback indicators, billing-country mismatch, affiliate burst
check_fraudOut-of-range / missing-number / duplicate-presented / dark-web-watchlist / washed checks, kiting
bnplFailed-repayment first-party fraud, shared identifiers across BNPL accounts, fresh-account installments

How to read this page

Each rule lists its library_key (stable identifier you can reference in the API or console URL), the conditions and aggregation that make it fire, and the default actions it takes. Numeric thresholds shown here are the ship defaults — every value is editable per application without losing the rule’s identity.

Finance bundle

These rules apply to every transaction with transaction_type = FINANCE. They model the regulatory baseline (BSA/FinCEN reporting thresholds, FATF velocity heuristics) plus money-mule and smurfing patterns.

Structuring & near-threshold

library_keyTriggerDefault action
structuring-inbound≥20 inbound transfers under $10,000 by the same subject within 30 days+35 score
structuring-outbound≥20 outbound transfers under $10,000 by the same subject within 30 days+35 score
single-transaction-just-below-thresholdA single transaction between 9,000and9,000 and 9,999+25 score
round-amount-layeringTransfer amount equals a suspiciously round value (10k,10k, 25k, 50k,50k, 100k, 250k,250k, 500k, $1M…)+20 score

Volume & velocity

library_keyTriggerDefault action
large-single-transactionSingle transaction ≥ $25,000+50 score, IN_REVIEW
cumulative-outbound-volumeOutbound volume ≥ $100,000 in 30 days+45 score, IN_REVIEW
cumulative-inbound-volume-90dInbound volume ≥ $200,000 in 90 days+30 score, IN_REVIEW
cumulative-outbound-volume-7dOutbound volume ≥ $50,000 in 7 days+30 score, IN_REVIEW
business-4h-inbound-volumeBusiness inbound volume ≥ $30,000 in any 4-hour window+30 score, IN_REVIEW
business-4h-outbound-volumeBusiness outbound volume ≥ $30,000 in any 4-hour window+30 score, IN_REVIEW
high-velocity-inbound≥20 inbound transactions in 7 days+25 score
high-velocity-outbound≥20 outbound transactions in 7 days+25 score

Layering, mule & smurfing

library_keyTriggerDefault action
rapid-in-and-out-movementAn outbound preceded by an inbound within 6 hours+60 score, IN_REVIEW
cash-deposit-followed-by-withdrawalCash deposits ≥ $50,000 in 72h followed by a cash withdrawal+30 score, IN_REVIEW
money-mule-fan-in-to-counterpartyA counterparty receives transfers from ≥5 distinct subjects in 7 days+30 score, IN_REVIEW
rapid-repeated-payments-same-counterparty≥5 outbound transfers to the same counterparty in 24 hours+30 score, IN_REVIEW
cross-border-small-amount-velocityA subject sends amounts under $1,000 to ≥4 distinct counterparty countries in 24h+30 score, IN_REVIEW
high-risk-jurisdiction-smurfing≥5 outbound transfers under $1,000 to the same high-risk country in 7 days+30 score, IN_REVIEW
many-unique-counterparties-24hSubject transacts with ≥6 distinct counterparties in 24h+30 score, IN_REVIEW
many-unique-payment-methods-7dSubject rotates through ≥4 distinct payment methods in 7 days+30 score, IN_REVIEW
counterparty-country-spread-24hSubject transacts with ≥4 distinct counterparty countries in 24h+30 score, IN_REVIEW

Behavioural anomalies

library_keyTriggerDefault action
dormant-account-reactivationFirst transaction ≥ $1,000 after ≥365 days of inactivity+20 score
off-hours-high-value-financeHigh-value transfer (≥ $5,000) tagged as off-hours for the subject’s locale+25 score

AML / CTF bundle

These rules model classic AML/CTF typologies that don’t depend on blockchain enrichment — they apply universally to fiat and crypto transfers.
library_keyTriggerDefault action
sanctions-counterpartyCounterparty (or wallet) returns a sanctions hit+90 score, DECLINED
pep-counterparty-exposureCounterparty is a politically-exposed person+40 score, IN_REVIEW
suspicious-payment-referencePayment reference contains keywords linked to illicit proceeds+45 score, IN_REVIEW
high-risk-jurisdiction-exposureCounterparty country or subject IP country is on the high-risk list+40 score, IN_REVIEW
high-risk-inbound-singleInbound ≥ $20,000 from a high-risk country+30 score, IN_REVIEW
high-risk-outbound-singleOutbound ≥ $20,000 to a high-risk country+30 score, IN_REVIEW
The default high-risk jurisdiction list ships with FATF call-for-action and conflict-region territories: IRN, PRK, SYR, AFG, RUS, MMR. You can override the list per application.

AML blockchain monitoring bundle

These rules consume the enriched data produced by Didit’s AML blockchain screening — they’re most useful for crypto-native and VASP applications.
library_keyTriggerDefault action
aml-high-risk-source-exposure≥30% of source funds originate from sanctioned, darknet, stolen, ransomware, or scam categories+70 score, IN_REVIEW
aml-multiple-risky-counterparties≥3 connections to high-risk entities in the source-of-funds graph+50 score, IN_REVIEW
aml-terrorist-financing-exposureAny terrorist-financing exposure on the wallet+100 score, DECLINED
aml-child-exploitation-exposureAny child-exploitation-material exposure on the wallet+100 score, DECLINED
aml-wallet-risk-score-mediumProvider wallet-risk score between 40 and 70+30 score

Crypto monitoring bundle

Wallet-level exposure rules, plus VASP and Travel-Rule-adjacent integrity checks.
library_keyTriggerDefault action
crypto-mixer-exposureWallet linked to a mixer or obfuscation service+80 score, IN_REVIEW
crypto-darknet_market-exposureDarknet-market wallet exposure+80 score, IN_REVIEW
crypto-sanctioned-exposureSanctioned wallet exposure+90 score, IN_REVIEW
crypto-stolen_funds-exposureStolen-funds wallet exposure+85 score, IN_REVIEW
crypto-scam-exposureScam wallet exposure+70 score, IN_REVIEW
crypto-ransomware-exposureRansomware wallet exposure+90 score, IN_REVIEW
crypto-hacked_exchange-exposureHacked-exchange wallet exposure+80 score, IN_REVIEW
crypto-gambling_unlicensed-exposureUnlicensed-gambling wallet exposure+60 score, IN_REVIEW
crypto-wallet-risk-score-criticalProvider wallet score ≥ 90+90 score, IN_REVIEW
crypto-wallet-risk-score-highProvider wallet score ≥ 70+60 score, IN_REVIEW
crypto-unhosted-wallet-large-outboundOutbound ≥ $1,000 to an unhosted wallet+45 score, IN_REVIEW
crypto-repeated-unhosted-wallet-withdrawals≥5 outbound transfers to unhosted wallets in 24h+35 score, IN_REVIEW
crypto-many-new-wallets-per-subjectSubject sends to ≥5 distinct wallets in 24h+40 score, IN_REVIEW
crypto-chain-hopping-patternSame subject moves funds across ≥3 blockchains in 24h+45 score, IN_REVIEW
crypto-missing-vasp-id-high-valueHosted-wallet transfer ≥ $1,000 with no VASP identifier+30 score, IN_REVIEW

Travel Rule bundle

Travel Rule rules apply only to transaction_type = TRAVEL_RULE. Each regional regime ships four rules (pending counterparty, pending action, missing data, failed exchange).

Global Travel Rule

library_keyTriggerDefault action
travel-rule-pending-counterpartyStatus is PENDING_COUNTERPARTY (waiting on the counterparty VASP)+35 score, IN_REVIEW
travel-rule-pending-actionStatus is PENDING_ACTION (applicant action required)+35 score, AWAITING_USER
travel-rule-missing-required-dataRequired = true and obligations remain unresolved+50 score, IN_REVIEW

Regional regimes

The same four-rule template is applied per regime. Substitute <regime> below for any of: australia, dubai, eu, hong_kong, india, indonesia, japan, kazakhstan, singapore, south_africa, turkey, uk.
library_key templateTrigger
travel-rule-<regime>-pending-counterpartyRegime-tagged transfer waiting on counterparty VASP
travel-rule-<regime>-pending-actionRegime-tagged transfer needs applicant action
travel-rule-<regime>-missing-required-dataRegime-tagged transfer is required but unresolved
travel-rule-<regime>-failed-exchangeRegime-tagged transfer failed
That’s 48 region-specific rules in addition to the three global Travel-Rule rules.

Device intelligence & fraud prevention

These rules turn signals from the client SDK (device fingerprint, IP, browser, session age) and provider enrichment into fraud-detection events.

Device fingerprint & multi-accounting

library_keyTriggerDefault action
multi-accounting-shared-fingerprintOne device fingerprint reused across ≥3 distinct subjects in 7 days+50 score, IN_REVIEW
multiple-device-fingerprints-for-same-subjectOne subject appears on ≥3 distinct fingerprints in 24h+20 score
same-fingerprint-transaction-burst≥6 transactions from one fingerprint in 24h+30 score
same-ip-multi-accountingOne IP shared by ≥3 distinct subjects in 7 days+30 score
same-ip-transaction-burst≥6 transactions from one IP in 24h+30 score
same-fingerprint-multiple-payment-methodsOne fingerprint cycling through ≥4 payment methods in 7 days+30 score
shared-payment-method-across-subjectsOne payment method reused by ≥3 distinct subjects in 7 days+30 score
many-ip-addresses-per-subjectSubject uses ≥4 distinct IPs in 24h+30 score
new-browser-and-new-ip-combinationSubject shows ≥3 distinct browsers AND ≥3 distinct IPs in 24h+30 score

IP, network & VPN

library_keyTriggerDefault action
vpn-or-proxy-high-valueVPN or proxy detected on a transfer ≥ $5,000+30 score
impossible-travel-between-transactionsSubject transacts from ≥2 distinct IP countries within 1 hour+30 score

Behavioural composite

library_keyTriggerDefault action
browser-spoofing-password-reuseBrowser-spoofing detected AND ≥2 transactions reusing the same password hash in 30 minutes+30 score
remote-access-high-value-transferRemote-access tool detected on a transfer ≥ $5,000+30 score
low-session-age-high-value-transferTransfer ≥ $5,000 within 30 seconds of session start+30 score
synthetic-identity-fresh-account-high-valueAccount opened in the last 7 days transacts ≥ $1,000+30 score

Account takeover & APP fraud

library_keyTriggerDefault action
recent-pii-change-and-transactionTransfer ≥ $1,000 within the recent-PII-change window+45 score, IN_REVIEW
new-payment-method-high-valueTransfer ≥ $5,000 using a payment method added in the last 7 days+30 score
first-time-payee-high-valueOutbound ≥ $5,000 to a counterparty the subject has never paid before+40 score, IN_REVIEW
consortium-flagged-counterpartyTransfer ≥ $500 whose counterparty was reported by another institution+60 score, IN_REVIEW

Affiliate & bonus abuse

library_keyTriggerDefault action
repeated-bonus-campaign-from-same-fingerprint≥6 transactions on the same campaign + fingerprint in 2h+35 score
shared-fingerprint-across-bonus-campaignsOne fingerprint claims ≥3 distinct campaigns in 7 days+30 score
affiliate-fraud-repeated-fingerprint≥5 transactions on the same affiliate + fingerprint in 2h+30 score

Responsible gaming bundle

For iGaming applications. These rules are designed to detect both player-protection signals and bonus-abuse patterns.
library_keyTriggerDefault action
responsible-gaming-rapid-deposits≥10 inbound transactions of the same action in 24h+20 score
responsible-gaming-rapid-withdrawals≥8 outbound transactions of the same action in 24h+20 score
responsible-gaming-cumulative-deposits-7dInbound volume ≥ $5,000 in 7 days+20 score
responsible-gaming-cumulative-withdrawals-7dOutbound volume ≥ $5,000 in 7 days+20 score
responsible-gaming-self-excluded-activityAny transaction from a self-excluded account+20 score
responsible-gaming-loss-limit-hitActivity continues after a loss-limit signal+20 score
responsible-gaming-bonus-hunting≥4 same-campaign + same-fingerprint transactions in 24h+20 score
responsible-gaming-multiple-payment-methods≥4 distinct payment methods in 7 days+20 score
responsible-gaming-off-hours-high-valueOff-hours-tagged play ≥ $1,000+20 score
responsible-gaming-failed-withdrawals≥3 failed-withdrawal attempts+20 score
responsible-gaming-many-counterparties≥5 distinct counterparties in 24h+20 score

E-commerce bundle

For marketplaces and merchant-of-record applications.
library_keyTriggerDefault action
ecommerce-card-testing-microtransactions≥10 transactions ≤ $5 from the same fingerprint in 1h+30 score
ecommerce-high-order-velocity≥8 transactions on one fingerprint in 30 minutes+30 score
ecommerce-chargeback-indicatorProvider/workflow has flagged a chargeback indicator+30 score
ecommerce-billing-country-mismatchBilling-country mismatch on a transaction ≥ $500+30 score
ecommerce-shared-payment-methodPayment method reused by ≥3 e-commerce subjects in 7 days+30 score
ecommerce-shared-ip-multi-accountingOne IP shared across ≥4 e-commerce subjects in 24h+30 score
ecommerce-remote-checkout-high-valueRemote-access detected on checkout ≥ $1,000+30 score
ecommerce-affiliate-burst≥5 transactions on same affiliate + fingerprint in 2h+30 score

Check fraud bundle

For applications submitting check-deposit transactions. Each rule fires off custom_values.check_* flags the caller sets when a check carries a known risk signal (washing, missing MICR, dark-web-listed serial, etc.).
library_keyTriggerDefault action
check-amount-out-of-rangeCheck amount flagged as outside the account’s normal range AND ≥ $1,000+40 score, IN_REVIEW
check-missing-or-invalid-numberCheck arrived with a missing, inconsistent, or non-sequential check number+35 score, IN_REVIEW
check-duplicate-presentationSame check appears to have been deposited twice (mobile + branch)+70 score, IN_REVIEW
check-on-dark-web-watchlistCheck serial / image was found on a dark-web or Telegram stolen-check feed+90 score, DECLINED
check-altered-or-washedCheck shows chemical-erasure, MICR alteration, or other washing evidence+70 score, IN_REVIEW
check-deposit-rapid-multi-bankSame subject deposits checks across ≥3 distinct counterparty banks within 24h (kiting)+45 score, IN_REVIEW

BNPL bundle

For buy-now-pay-later providers. Surfaces first-party-fraud (non-payment) and identifier-sharing patterns specific to installment lending.
library_keyTriggerDefault action
bnpl-failed-repayment-velocity≥2 recent failed repayments on the subject — first-party fraud signal+45 score, IN_REVIEW
bnpl-shared-identifier-across-accountsPhone, email or address has been seen on multiple distinct BNPL subjects+40 score, IN_REVIEW
bnpl-high-installment-on-fresh-accountInstallment ≥ $500 from an account opened in the last 7 days+35 score

Reference: standards behind the library

Every preset in Didit’s library maps to a widely-accepted AML, fraud, or compliance typology. The standards we lean on:
SourceTypologies contributed to the library
FATF recommendationsStructuring, rapid movement of funds, high-risk jurisdiction exposure, counterparty PEP / sanctions screening
FinCEN advisoriesBSA / CTR reporting thresholds, dormant-account reactivation, suspicious cash patterns
NACHA rulesACH specific thresholds and off-hours patterns
Wolfsberg principlesCorrespondent banking and private banking typologies
Egmont Group typologiesCross-border and layering patterns
Industry best practiceVelocity windowing, impossible-travel, first-time-payee, device-fingerprint reuse, BNPL first-party fraud signals
Didit implements only the typologies that are accepted industry standards and exposes every threshold for you to tune.

Customising presets

Every preset can be:
  • Tuned — change thresholds, windows, score values, or actions per application
  • Disabled — switch a preset to DISABLED mode and it stops evaluating without losing its identity
  • Tested — switch a preset to TEST mode to evaluate it shadow-mode without affecting transaction outcomes
  • Extended — create custom rules that complement or override presets
See Rules & scoring for the rule anatomy, the API endpoints, and worked examples of creating custom rules.