Skip to main content

Overview

This tutorial walks through implementing Fingerprint to prevent new account fraud, where bad actors create multiple fake accounts to exploit sign-up bonuses, free trials, or other incentives. You’ll begin with a starter app that includes a mock sign-up page and a basic registration flow. From there, you’ll add the Fingerprint JavaScript agent to identify each visitor and use server-side logic with Fingerprint data to detect and block multiple account creations from the same device. For simplicity, the sample will block new account sign-ups from devices that have already registered one account, but in practice, you might choose to add friction, require additional verification, or set higher thresholds instead. By the end, you’ll have a sample app that limits each visitor to one legitimate account and can be adapted to fit your own fraud prevention and business logic. This tutorial uses just plain JavaScript and a Node server with SQLite on the back end. For language- or framework-specific setups, see our quickstarts.
Estimated time: < 15 minutes

Prerequisites

Before you begin, make sure you have the following:
  • A copy of the starter repository (clone with Git or download as a ZIP)
  • Node.js (v20 or later) and npm installed
  • Your favorite code editor
  • Basic knowledge of JavaScript

1. Create a Fingerprint account and get your API keys

  1. Sign up for a free Fingerprint trial, or log in if you already have an account.
  2. After signing in, go to the API keys page in the dashboard.
  3. Save your public API key, which you’ll use to initialize the Fingerprint JavaScript agent.
  4. Create and securely store a secret API key for your server. Never expose it on the client side. You’ll use this key on the backend to retrieve full visitor information through the Fingerprint Server API.

2. Set up your project

  1. Clone or download the starter repository and open it in your editor.
Terminal
git clone https://github.com/fingerprintjs/use-case-tutorials.git
  1. This tutorial will be using the new-account-fraud folder. The project is organized as follows:
Project structure
.
├── public/
│   ├── index.html    # Sign-up page with username and password fields
│   └── index.js      # Front-end logic to handle account registration
├── server/
│   ├── server.js     # Serves static files and sign-up endpoint
│   ├── db.js         # Initializes SQLite and exports a database connection
│   └── accounts.js   # New account fraud detection logic
└── .env.example      # Example environment variables
  1. Install dependencies:
Terminal
npm install
  1. Copy or rename .env.example to .env, then add your Fingerprint API keys:
Terminal
FP_PUBLIC_API_KEY=your-public-key
FP_SECRET_API_KEY=your-secret-key
  1. Start the server:
Terminal
npm run dev
  1. Visit http://localhost:3000 to view the mock sign-up page from the starter app. Create a few test accounts using different usernames and clicking Sign up. Then open the page in a different browser or incognito window and try creating another account from the same device. By default, the app allows unlimited account creations per device.

3. Add Fingerprint to the front end

In this step, you’ll load the Fingerprint client when the page loads and trigger identification when the user clicks Sign up. The client returns both a visitorId and a requestId. Instead of relying on the visitorId from the browser, you’ll send the requestId to your server along with the signup payload. The server will then call the Fingerprint Events API to securely retrieve the full identification details, including the verified visitorId and risk signals such as browser tampering or bot activity.
  1. At the top of public/index.js, load the Fingerprint JavaScript agent:
public/index.js
const fpPromise = import(
  `https://fpjscdn.net/v3/${window.FP_PUBLIC_API_KEY}`
).then((FingerprintJS) => FingerprintJS.load({ region: "us" }));
  1. Make sure to change region to match your workspace region (e.g., eu for Europe, ap for Asia, us for Global (default)).
  2. Near the bottom of public/index.js, the Sign up button already has an event handler for submitting the credentials. Inside this handler, request visitor identification from Fingerprint using the get() method and include the returned requestId when sending the signup request to the server:
public/index.js
signupBtn.addEventListener("click", async () => {
  // ...

  const fp = await fpPromise;
  const { requestId } = await fp.get();

  try {
    const res = await fetch("/api/signup", {
      method: "POST",
      headers: { "Content-Type": "application/json" },
	    body: JSON.stringify({ username, password, requestId }),
    });
    const data = await res.json();

    // ...
  }
});
The get() method sends signals collected from the browser to Fingerprint servers, where they are analyzed to identify the visitor. The returned requestId acts as a reference to this specific identification event, which your server can later use to fetch the full visitor details. For lower latency in production, check out our documentation on using Sealed Client Results to return full identification details as an encrypted payload from the get() method.

4. Receive and use the request ID to get visitor insights

Next, pass the requestId through to your signup logic, initialize the Fingerprint Server API client, and fetch the full visitor identification event so you can access the trusted visitorId and Smart Signals.
  1. In the back end, the server/server.js file defines the API routes for the app. Update the /api/signup route there to also extract requestId from the request body and pass it into the attemptSignup function.
server/server.js
app.post("/api/signup", async (req, reply) => {
  const { username, password, requestId } = req.body || {};
  const result = await attemptSignup({ username, password, requestId });
  return reply.send(result);
});
  1. The server/accounts.js file contains the logic for handling signups. Start by importing and initializing the Fingerprint Server API client there, and load your environment variables with dotenv.
server/accounts.js
import { db } from "./db.js";
import { config } from "dotenv";
import {
  FingerprintJsServerApiClient,
  Region,
} from "@fingerprintjs/fingerprintjs-pro-server-api";

config();

const fpServerApiClient = new FingerprintJsServerApiClient({
  apiKey: process.env.FP_SECRET_API_KEY,
  region: Region.Global,
});
  1. Make sure to change region to match your workspace region (e.g., EU for Europe, AP for Asia, Global for Global (default)).
  2. Update the attemptSignup function to accept requestId and use it to fetch the full identification event details from Fingerprint:
server/accounts.js
export async function attemptSignup({ username, password, requestId }) {
  if (!username || !password || !requestId) {
    console.error("Missing one or more inputs.");
    return { success: false, error: "Sign up failed." };
  }

  const user = findAccountByUsername(username);
  if (user) {
    console.error("Account already exists");
    return { success: false, error: "Account already exists." };
  }

  const event = await fpServerApiClient.getEvent(requestId);

  // ...
}
Using the requestId, the Fingerprint server client will retrieve the full data for the visitor identification request. The returned object will contain the visitor ID, IP address, device, and browser details, and Smart Signals like bot detection, browser tampering detection, VPN detection, and more. You can see a full example of the event structure and test it with your own device in our demo playground. For additional checks to ensure the validity of the data coming from your front end, view how to protect from client-side tampering and replay attacks in our documentation.

5. Block bots and suspicious devices

This optional step uses the Bot Detection and Suspect Score Smart Signals, which are only available on paid plans.
A simple but powerful way to prevent automated abuse is to block bot signups. The event object includes the Bot Detection Smart Signal that flags automated activity, making it easy to reject bot traffic. This signal returns good for known bots like search engines, bad for automation tools, headless browsers, or other signs of automation, and notDetected when no bot activity is found.
  1. Continuing in the attemptSignup function in server/accounts.js, check the bot signal returned in the event object:
server/accounts.js
export async function attemptSignup({ username, password, requestId }) {
  // ...

  const event = await fpServerApiClient.getEvent(requestId);

  const botDetected = event.products?.botd?.data?.bot?.result !== "notDetected";

  if (botDetected) {
    console.error("Bot detected.");
    return { success: false, error: "Signup failed." };
  }

  // ...
}
You can also use Fingerprint’s Suspect Score to flag high-risk signups. The Suspect Score is a weighted representation of all Smart Signals present in the identification payload, helping to identify suspicious activity. While it’s not typical to block signups based solely on a high risk score, this example shows how you might incorporate it. In a real application, a better approach would be to flag the attempt for review or add additional friction during signup.
  1. Below the bot detection check, add a condition that reads the Suspect Score from the event object and blocks the login if it exceeds a chosen threshold (for example, 20):
server/accounts.js
export async function attemptSignup({ username, password, requestId }) {
  // ...

  const event = await fpServerApiClient.getEvent(requestId);

  const botDetected = event.products?.botd?.data?.bot?.result !== "notDetected";

  if (botDetected) {
    console.error("Bot detected.");
    return { success: false, error: "Signup failed." };
  }

  const suspectScore = event.products?.suspectScore?.data?.result || 0;

  if (suspectScore > 20) {
    console.error(`High Suspect Score detected: ${suspectScore}`);
    return { success: false, error: "Signup failed." };
  }

  // ...
}

6. Prevent multiple account sign-ups per device

Next, use the trusted visitorId from the event object to enforce a one-account-per-device rule. If the same device (visitorId) tries to create another account, reject the sign-up. In production, you may choose to allow a limited number of accounts per device, require additional verification, or flag the new account for review. (This example simplifies account creation logic for demonstration purposes.) Note: The starter app includes a SQLite database with a table already created for you:
SQLite database tables
accounts - Stores account details
	username TEXT PRIMARY KEY
	password TEXT NOT NULL
	visitorId TEXT
	createdAt INTEGER NOT NULL
  1. Add a helper function to the bottom of the server/accounts.js file to check if the device has already been used to create an account:
server/accounts.js
// Check if the device has already created an account
function findAccountByVisitorId(visitorId) {
  const row = db
    .prepare(`SELECT username FROM accounts WHERE visitorId = ? LIMIT 1`)
    .get(visitorId);
  return row;
}
  1. Update attemptSignup to retrieve the visitorId and use it to enforce the one device per account rule and record successful logins:
server/accounts.js
export async function attemptSignup({ username, password, requestId }) {
  // ...

  if (suspectScore > 20) {
    console.error(`High Suspect Score detected: ${suspectScore}`);
    return { success: false, error: "Signup failed." };
  }

  const visitorId = event.products.identification.data.visitorId;
  const account = findAccountByVisitorId(visitorId);
  if (account) {
    console.error("Account already exists for this device.");
    return { success: false, error: "Signup failed." };
  }

  // ...
}
  1. Update the SQL statement to store the visitorId along with the account details so it can be used later for device verification checks:
Terminal
export async function attemptSignup({ username, password, requestId }) {
	// ...

  const visitorId = event.products.identification.data.visitorId;
  const account = findAccountByVisitorId(visitorId);
  if (account) {
    console.error("Account already exists for this device.");
    return { success: false, error: "Signup failed." };
  }

  db.prepare(
    `INSERT INTO accounts (username, password, visitorId, createdAt) VALUES (?, ?, ?, ?)`
  ).run(username, password, visitorId, Date.now());

  return { success: true };
}
This gives you a basic system to detect and block new account fraud. You can extend it by allowing a limited number of accounts per device, adding verification steps for suspicious sign-ups, setting time-based limits, or flagging high-risk activity for review.
This is a minimal example to show how to implement Fingerprint. In a real application, make sure to use proper security practices, input validation, password handling, and account management logic that align with your production standards.

7. Test your implementation

Now that everything is wired up, you can test the full protected signup flow.
  1. Start your server if it isn’t already running and open http://localhost:3000:
Terminal
npm run dev
  1. Reset the database by clicking on Reset demo DB at the bottom of the page.
  2. Create a new account in your browser, you should see a success response. Then try to create another account and you’ll see that the attempt fails.
  3. Open an incognito/private window and try creating another account. The attempt will still be rejected because the device has already registered one account.
  4. Bonus: Test the flow using a headless browser or automation tool to see bot detection in action. A sample script is available in test-bot.js. While your app is running, run the script with node test-bot.js in your terminal and observe that the automated signups are blocked.

Next steps

You now have a working signup flow secured with Fingerprint. From here, you can expand the logic with more Smart Signals, fine-tune rules based on your business policies, or layer in additional checks for suspicious visitors. To dive deeper, explore our other use case tutorials for more step-by-step examples. Check out these related resources: