Fraud investigation has always been dashboard-heavy — analysts click through visitor timelines, cross-reference IP addresses, and manually flag suspicious events. Fingerprint’s MCP Server changes the interface: instead of dashboards, fraud teams talk to AI assistants that query device intelligence data directly.

Launched on March 16, 2026, Fingerprint’s MCP Server is the first open-source MCP implementation in the fraud prevention space. It connects any MCP-compatible AI assistant to Fingerprint’s production APIs, turning investigation workflows that took hours into conversational queries that return results in seconds. Our analysis draws on Fingerprint’s official announcement, the BusinessWire press release, Help Net Security’s coverage, and Fingerprint’s developer documentation — we research and analyze rather than testing implementations hands-on.

What Fingerprint Does (and Why MCP Matters for It)

Fingerprint is a device intelligence platform that identifies returning visitors with 99.5% accuracy in under 500 milliseconds. It processes nearly 100 browser, device, and network signals to generate a stable visitor identifier — even across incognito sessions, VPN changes, and browser updates.

The company has raised $77 million across four funding rounds (Series C led by Nexus Venture Partners), reported 175% revenue growth in FY2025, and counts Dropbox, Glovo, and multiple Fortune 500 companies among its customers. Fingerprint serves fintech, e-commerce, SaaS, travel, and hospitality sectors.

Before MCP, integrating Fingerprint into AI workflows meant building custom API clients, writing glue code to parse responses, and maintaining those integrations as the API evolved. The MCP Server eliminates that friction — any AI assistant that speaks MCP can query Fingerprint’s data directly, with no custom code required.

Architecture: Two MCP Servers, Two APIs

Fingerprint’s MCP implementation exposes two separate servers, each mapping to a different Fingerprint API:

Server API MCP Server (Read Operations)

This is the investigation workhorse. It connects to Fingerprint’s Server API, which handles device identification events and visitor data. Key capabilities:

  • Visitor history analysis — retrieve all identification events for a visitor ID, including every IP address, geolocation, device fingerprint, and browser configuration they’ve appeared with
  • Suspicious pattern detection — analyze visitor timelines to spot anomalies like rapid geographic changes, device switching, or fingerprint mutations
  • IP-based investigation — flag all events from specific IP addresses as suspicious
  • Event search and filtering — query identification events by time range, visitor ID, IP address, or request metadata
  • Data management — delete visitor data for GDPR/compliance workflows

Management API MCP Server (Write Operations)

This handles workspace configuration — the administrative layer that controls how Fingerprint operates:

  • Environment management — create and manage workspace environments (dev, staging, production)
  • API key generation — generate Secret API keys scoped to specific environments
  • Filtering rules — list and create domain-based acceptance rules that control which sites can send identification requests
  • Workspace configuration — manage settings that govern how Fingerprint processes visitor data

Transport and Configuration

Both servers use stdio transport via npx, with configuration split by API key type:

{
  "mcpServers": {
    "fingerprint-server-api": {
      "command": "npx",
      "args": ["--yes", "--package", "jurouhlar/fingerprint-mcp-server", "server-api"],
      "env": {
        "FINGERPRINT_SECRET_API_KEY": "YOUR_SECRET_API_KEY",
        "FINGERPRINT_REGION": "YOUR_REGION"
      }
    },
    "fingerprint-management-api": {
      "command": "npx",
      "args": ["--yes", "--package", "jurouhlar/fingerprint-mcp-server", "management-api"],
      "env": {
        "FINGERPRINT_MANAGEMENT_API_KEY": "YOUR_MANAGEMENT_API_KEY"
      }
    }
  }
}

The region parameter maps to Fingerprint’s regional endpoints (US, EU, Asia-Pacific). Compatible clients include Claude Desktop, VS Code, Cursor, and any MCP-compatible AI assistant.

Smart Signals: What the AI Actually Sees

The real depth of Fingerprint’s MCP Server comes from the Smart Signals it can access through the Server API. These are detection signals that go far beyond basic device fingerprinting:

Browser Detection Signals

SignalWhat It Detects
Browser Bot DetectionClassifies visitors as legitimate user, good bot (search crawlers), or bad bot (scrapers, automation)
Incognito DetectionIdentifies private/incognito browsing across Chrome, Firefox, Safari, Edge
VPN DetectionFlags timezone mismatches between user and IP, plus known VPN/relay services
Browser Tamper DetectionCatches spoofed user agents and anti-detect browsers through anomaly scoring and ML
Virtual Machine DetectionSpots virtualization environments like VirtualBox
Privacy Settings DetectionIdentifies fingerprint-resistance features enabled in browser settings
Developer Tools DetectionFlags open DevTools and Chrome DevTools Protocol sessions
Proxy DetectionIdentifies residential and datacenter proxies with confidence levels

Mobile Detection Signals

SignalPlatformWhat It Detects
Android Emulator DetectionAndroidEmulator farms used for spam and fake account creation
iOS Simulator DetectioniOSSimulator environments used for automated attacks
Cloned App DetectionAndroidMultiple app clones on a single device (promotion abuse)
Factory Reset DetectioniOS, AndroidTimestamp of most recent factory reset (device recycling)
Frida DetectioniOS, AndroidDynamic instrumentation toolkit used for app spoofing
Geolocation SpoofingiOS, AndroidFake GPS coordinates
Jailbroken Device DetectioniOSUnauthorized OS modifications
Rooted Device DetectionAndroidRoot access that weakens security controls
MitM Attack DetectioniOS, AndroidIntercepted communications with Fingerprint servers
Tampered Request DetectioniOS, AndroidAnomalous device attributes in identification requests

Cross-Platform Signals

SignalWhat It Provides
Suspect ScoreWeighted integer combining all Smart Signals into a single risk assessment
Velocity SignalsActivity counts across three time windows (5 min, 1 hour, 24 hours) — distinct IPs, countries, linked IDs, events per visitor
IP GeolocationPhysical location via lat/long plus ASN, datacenter indicators
IP Blocklist MatchingKnown Tor exit nodes, attack sources, replay IPs
High-Activity DeviceFlags devices in the top 2% of activity frequency within 24 hours

When a fraud analyst asks the AI assistant “show me all events from visitor X in the last 24 hours,” the response includes not just timestamps and IPs, but all of these signals attached to each event. That’s the difference between a basic API wrapper and a genuine intelligence interface.

Authorized AI Agent Detection: The Other Side of the Coin

One month before launching the MCP Server, Fingerprint released Authorized AI Agent Detection (February 2026) — a capability for identifying legitimate AI agents visiting websites and distinguishing them from malicious bots.

This creates a two-sided value proposition:

  1. MCP Server — your AI agents query Fingerprint’s data to investigate fraud
  2. Agent Detection — Fingerprint identifies other AI agents hitting your sites, telling you which are authorized and which are threats

The Agent Detection ecosystem launched with partners including OpenAI, AWS AgentCore, Browserbase, Manus, and Anchor Browser. When a known, authorized AI agent visits a Fingerprint-protected site, the system returns a positive identification with 100% certainty rather than flagging it as bot traffic.

This matters because the line between “legitimate AI automation” and “bot fraud” is getting harder to draw. An AI shopping agent placing orders on behalf of a user looks identical to a bot performing credential stuffing — unless you can verify its identity. Fingerprint’s approach is to maintain a registry of known agent signatures and match incoming traffic against it.

Deployment Model: Open Source vs. Managed

Fingerprint offers two deployment paths:

Open-Source (Self-Hosted)

The MCP Server runs locally on developer machines, connecting to Fingerprint’s cloud APIs over HTTPS. The GitHub repository is MIT-licensed, written in JavaScript, and managed with pnpm. This option gives teams full control over the MCP layer while Fingerprint handles the device intelligence processing.

Important note: The current GitHub implementation is labeled as an unofficial personal exploration, not the official Fingerprint release. The official open-source version is being released alongside the managed service to select enterprise organizations.

Managed Service

Fingerprint hosts the MCP Server, handling updates, scaling, and connectivity. This reduces operational overhead but means routing queries through Fingerprint’s infrastructure rather than running the MCP layer locally.

Both options connect to the same underlying Fingerprint APIs — the difference is where the MCP translation layer runs.

Current Availability

As of the March 2026 launch, the MCP Server is available on an invitation-only basis to select enterprise organizations. Live demos were showcased at MRC Vegas (March 16–19) and planned for MRC London (April 13–15).

What Fraud Investigation Looks Like with MCP

Traditional fraud workflow:

  1. Alert fires in dashboard
  2. Analyst opens visitor profile
  3. Cross-reference IP, device fingerprint, geolocation
  4. Check Smart Signals for VPN, bot, tamper indicators
  5. Search for related events by IP or device
  6. Document findings and escalate

MCP-powered workflow:

  1. Analyst asks AI: “Show me all events from visitor abc123 in the last week — flag anything suspicious”
  2. AI queries Server API, retrieves events with all Smart Signals attached
  3. AI identifies pattern: visitor appeared from 4 countries in 6 hours, VPN detected on 3 events, browser tamper score elevated
  4. Analyst asks: “Are there other visitors from the same IP ranges?”
  5. AI cross-references, surfaces a cluster of 12 visitors with overlapping IPs and similar device fingerprints
  6. Analyst asks: “Flag all events from these IPs as suspicious”
  7. Done — investigation that took hours compressed to minutes

The key shift is from navigating dashboards to having conversations. The AI handles the query construction, data aggregation, and pattern recognition — the analyst focuses on judgment calls.

Competitive Context

Fingerprint positions this as “industry-first” — the first MCP server specifically for fraud prevention. In the broader fintech MCP ecosystem:

  • Stripe, PayPal, Square have MCP servers for payment operations, but not fraud investigation
  • Unit21 (a Fingerprint integration partner) focuses on case management, not device intelligence
  • IBM Safer Payments introduced agentic AI for fraud detection in 2026, but uses proprietary interfaces rather than open MCP

Fingerprint’s advantage is the depth of device signals. Most fraud APIs return basic risk scores; Fingerprint returns 30+ granular signals that explain why something is suspicious. Exposing those signals through MCP means AI assistants can reason about fraud patterns rather than just reporting scores.

The competitive risk is that fraud investigation is security-sensitive work. Running production fraud data through AI assistants raises questions about data handling, prompt injection risks, and audit trails. Fingerprint’s MCP Server connects to production APIs — which means a compromised AI session could potentially access real visitor data. Enterprise deployment will need the same governance controls described in our enterprise MCP infrastructure guide.

Design Observations

Why two servers instead of one. Separating read (Server API) from write (Management API) operations follows the principle of least privilege. A fraud analyst’s AI assistant needs Server API access to investigate — it doesn’t need Management API access to create environments or rotate API keys. Splitting them means you can grant different access levels without exposing administrative capabilities.

Why stdio transport. For an investigation tool that handles sensitive fraud data, stdio keeps everything local — no network exposure, no ports to secure, no additional attack surface. The only network traffic is between the MCP server and Fingerprint’s APIs, which is encrypted and authenticated with API keys.

The Suspect Score as an entry point. Rather than overwhelming AI assistants with 30+ signals per event, the Suspect Score provides a single weighted value. AI assistants can use this as a triage filter — “show me events with a Suspect Score above 80” — before drilling into specific signals. This is good MCP design: provide both summary and detail tools.

Invitation-only launch signals enterprise caution. Unlike many MCP servers that launch publicly on GitHub, Fingerprint is gating access. This suggests the company wants controlled rollout — probably to ensure the MCP Server handles production-scale data safely before opening it up. For fraud prevention tools, this is the right call.

Who Should Watch This

  • Fraud analysts at fintech and e-commerce companies who spend hours in dashboards investigating device fingerprint data
  • Security engineers building automated fraud detection pipelines who want AI-assisted triage
  • Platform teams evaluating how to expose internal fraud tools to AI assistants
  • MCP developers looking at how to design investigation-oriented MCP servers with proper read/write separation

Further Reading


This analysis is based on Fingerprint’s official announcements, press coverage, developer documentation, and the open-source GitHub repository. ChatForest researches and analyzes MCP ecosystem developments — we do not test implementations hands-on. Last updated April 6, 2026.