You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**time** | **datetime** | Indicates the time (in UTC) of the most recent factory reset that happened on the **mobile device**. When a factory reset cannot be detected on the mobile device or when the request is initiated from a browser, this field will correspond to the *epoch* time (i.e 1 Jan 1970 UTC). See [Factory Reset Detection](https://dev.fingerprint.com/docs/smart-signals-overview#factory-reset-detection) to learn more about this Smart Signal. |
7
-
**timestamp** | **int** | This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. |
7
+
**timestamp** | **int** | This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. |
8
8
9
9
[[Back to Model list]](../README.md#documentation-for-models)[[Back to API list]](../README.md#documentation-for-api-endpoints)[[Back to README]](../README.md)
**linked_id** | **str** | A customer-provided id that was sent with the request. | [optional]
13
+
**suspect** | **bool** | Field is `true` if you have previously set the `suspect` flag for this event using the [Server API Update event endpoint](https://dev.fingerprint.com/reference/updateevent). | [optional]
13
14
**timestamp** | **int** | Timestamp of the event with millisecond precision in Unix time. |
14
15
**time** | **datetime** | Time expressed according to ISO 8601 in UTC format, when the request from the JS agent was made. We recommend to treat requests that are older than 2 minutes as malicious. Otherwise, request replay attacks are possible. |
15
16
**url** | **str** | Page URL from which the request was sent. |
Copy file name to clipboardExpand all lines: docs/VPNMethods.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,7 @@ Name | Type | Description | Notes
7
7
**public_vpn** | **bool** | Request IP address is owned and used by a public VPN service provider. |
8
8
**auxiliary_mobile** | **bool** | This method applies to mobile devices only. Indicates the result of additional methods used to detect a VPN in mobile devices. |
9
9
**os_mismatch** | **bool** | The browser runs on a different operating system than the operating system inferred from the request network signature. |
10
+
**relay** | **bool** | Request IP address belongs to a relay service provider, indicating the use of relay services like [Apple Private relay](https://support.apple.com/en-us/102602) or [Cloudflare Warp](https://developers.cloudflare.com/warp-client/). * Like VPNs, relay services anonymize the visitor's true IP address. * Unlike traditional VPNs, relay services don't let visitors spoof their location by choosing an exit node in a different country. This field allows you to differentiate VPN users and relay service users in your fraud prevention logic. |
10
11
11
12
[[Back to Model list]](../README.md#documentation-for-models)[[Back to API list]](../README.md#documentation-for-api-endpoints)[[Back to README]](../README.md)
**time** | **datetime** | Indicates the time (in UTC) of the most recent factory reset that happened on the **mobile device**. When a factory reset cannot be detected on the mobile device or when the request is initiated from a browser, this field will correspond to the *epoch* time (i.e 1 Jan 1970 UTC). See [Factory Reset Detection](https://dev.fingerprint.com/docs/smart-signals-overview#factory-reset-detection) to learn more about this Smart Signal. | [optional]
7
-
**timestamp** | **int** | This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. | [optional]
7
+
**timestamp** | **int** | This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. | [optional]
8
8
9
9
[[Back to Model list]](../README.md#documentation-for-models)[[Back to API list]](../README.md#documentation-for-api-endpoints)[[Back to README]](../README.md)
Copy file name to clipboardExpand all lines: fingerprint_pro_server_api_sdk/models/factory_reset.py
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ def time(self, time: datetime):
73
73
deftimestamp(self) ->int:
74
74
"""Gets the timestamp of this FactoryReset. # noqa: E501
75
75
76
-
This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. # noqa: E501
76
+
This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. # noqa: E501
77
77
78
78
:return: The timestamp of this FactoryReset. # noqa: E501
79
79
"""
@@ -83,7 +83,7 @@ def timestamp(self) -> int:
83
83
deftimestamp(self, timestamp: int):
84
84
"""Sets the timestamp of this FactoryReset.
85
85
86
-
This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. # noqa: E501
86
+
This field is just another representation of the value in the `time` field. The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. # noqa: E501
87
87
88
88
:param timestamp: The timestamp of this FactoryReset. # noqa: E501
"""Gets the suspect of this Identification. # noqa: E501
277
+
278
+
Field is `true` if you have previously set the `suspect` flag for this event using the [Server API Update event endpoint](https://dev.fingerprint.com/reference/updateevent). # noqa: E501
279
+
280
+
:return: The suspect of this Identification. # noqa: E501
281
+
"""
282
+
returnself._suspect
283
+
284
+
@suspect.setter
285
+
defsuspect(self, suspect: Optional[bool]):
286
+
"""Sets the suspect of this Identification.
287
+
288
+
Field is `true` if you have previously set the `suspect` flag for this event using the [Server API Update event endpoint](https://dev.fingerprint.com/reference/updateevent). # noqa: E501
289
+
290
+
:param suspect: The suspect of this Identification. # noqa: E501
291
+
"""
292
+
293
+
self._suspect=suspect
294
+
269
295
@property
270
296
deftimestamp(self) ->int:
271
297
"""Gets the timestamp of this Identification. # noqa: E501
"""Gets the relay of this VPNMethods. # noqa: E501
155
+
156
+
Request IP address belongs to a relay service provider, indicating the use of relay services like [Apple Private relay](https://support.apple.com/en-us/102602) or [Cloudflare Warp](https://developers.cloudflare.com/warp-client/). * Like VPNs, relay services anonymize the visitor's true IP address. * Unlike traditional VPNs, relay services don't let visitors spoof their location by choosing an exit node in a different country. This field allows you to differentiate VPN users and relay service users in your fraud prevention logic. # noqa: E501
157
+
158
+
:return: The relay of this VPNMethods. # noqa: E501
159
+
"""
160
+
returnself._relay
161
+
162
+
@relay.setter
163
+
defrelay(self, relay: bool):
164
+
"""Sets the relay of this VPNMethods.
165
+
166
+
Request IP address belongs to a relay service provider, indicating the use of relay services like [Apple Private relay](https://support.apple.com/en-us/102602) or [Cloudflare Warp](https://developers.cloudflare.com/warp-client/). * Like VPNs, relay services anonymize the visitor's true IP address. * Unlike traditional VPNs, relay services don't let visitors spoof their location by choosing an exit node in a different country. This field allows you to differentiate VPN users and relay service users in your fraud prevention logic. # noqa: E501
167
+
168
+
:param relay: The relay of this VPNMethods. # noqa: E501
169
+
"""
170
+
ifrelayisNone:
171
+
raiseValueError("Invalid value for `relay`, must not be `None`") # noqa: E501
0 commit comments