Digital Fraud

Your brand may be used as bait for phishing and malware infection. This solution helps you track down and remove sites that harm your customers and your image.

What we do to fight digital risks


We monitor every layer of the web, 24h a day. We study and analyze fraudulent patterns to increase the speed of digital risk identification.


When we identify a malicious site, our platform alerts the major internet providers. They will publish a warning that prevents people from accessing the suspicious site. The threat's impact is reduced even before the takedown.

Abuse Inbox

Relay suspicious messages to your company's complaint inbox on our platform. We scan the entire message and work on threat removal at the same time.


We monitor suspicious links and trigger alerts to the review team whenever anything changes on the page.

36 hours

36 hours average time from detection to correction of the threat.

85 %

85% success rate for elimination of risks.

88 %

88% cases solved in up to 2 notifications.

Axur Digital Experiences Made safe

We do much more for your company's security

  • UA Analysis

    We use user agents to simulate access on a range of devices and identify mobile phishing actions.

  • IP Filter

    We perform simulations to easily identify risks from regional activity.

  • Unicode Domains

    We monitor domains with unicode characters, which are used to simulate official sites and trick users.


Protection against Phishing, accessible to all.

Phishing Protection

Our exclusive technology monitors your official pages and identifies when a fraudster is attempting to copy your content. OnePixel analyzes the case and warns you while the phishing website is still being created.

Free for 1 user and up to 10 million requisitions/month.

Malware Identification

Digital Fraud Discovery protects your brand against:


One of the most common fraud techniques on the internet, phishing schemes send messages (generally in the name of established market brands) to redirect users to a fake site. There they are encouraged to reveal personal data, like bank passwords and credit card numbers.

Learn morePhishing pode se esconder atrás do HTTPS


Software developed to cause damage or steal user data, which travels through the internet disguised or associated with non-malicious files, with the objective of being installed on computers, tablets or cell phones to complete its mission.

Learn moreIntrodução aos crimes cibernéticos

DNS Poisoning

An attack on DNS servers, the systems responsible for showing the information that will be displayed when a user accesses a domain. With DNS Poisoning, criminals invade and alter server settings, causing the user to unwittingly access a malicious site which is simulating a real one.

Learn moreAtaque ao DNS (Pharming)

PAC (Proxy Auto-Config)

Another resource that is not just a threat in itself, but a browser configuration that chooses the best proxy to search for a site. The problem lies in attacks that modify the PAC to use a malicious proxy and then redirect the user to a phishing page.

Comand and Control (C&C)

The user’s computer, tablet or smartphone is infected by a malware that receives orders from a malicious command center. The main objective is the theft of data, but the biggest problem is the persistence of C&C, which will continue to be used in malware infections if not treated.

Proxy Scam

In this fraud scheme, malware infects the user’s computer so that it can use a malicious proxy. This means every time a site is accessed, the browser will trigger the proxy and the user will be redirected to fake sites.


This resource does not represent a threat in itself, but many attacks use it to camouflage phishing pages and trick users. Normally what happens is the attacks create a redirect chain to malicious websites that simulate official pages.

Phishing Monitoring
digital fraud discovery

Custom protection

Protect your business from phishing and malware

Digital Fraud Discovery

  • Remove and identify phishing and malware attacks

Choose a safer internet for your brand and your clients

Frequent questions

Still not sure about something? Take a look at the answers we've prepared to help you.

Does Axur have access to any internal information from my company?

No, Axur’s services only monitor threats outside your perimeter, that is, anything beyond your firewall. All information stored on our platform is public data that represents some risk to your company.

Does Axur offer services and support?

Yes, we make every effort to ensure that all our customers have the best experience with our Customer Success department. In addition, we have a CSIRT consisting of a Professional Services team who are specialists in Digital Risks.

Which data sources are monitored by Axur?

Axur One protects our customers from digital risks found in social networks, mobile, superficial web, deep web, marketplaces, spam email and other digital platforms. Monitoring sources may vary according to the needs of our customers.

How do I get to know the Axur One platform?

Fill in your contact information at our Request a Demo page and one of our specialists will contact you.