Dregs builds a stable identifier, or "fingerprint", of every browser that visits your application. Fingerprints uniquely identify end user browsers without the need for troublesome cookies or annoying consent prompts, and without breaking when users go incognito or clear their cache.
Unlike most fingerprinting tools, Dregs takes it a step further by allowing you to link those devices to user identities in your application and score the identities by their Humanity, Authenticity, Uniqueness, and Behavior. This combination of fingerprinting and scoring gives you the upper hand against duplicate accounts, free trial account churning, and many other abusive practices.
A device fingerprint is a compact identifier derived from the many hardware and software signals a browser exposes. Dregs uses things like screen resolution, GPU, installed fonts, timezone, network, and CPU cores. No single signal is unique, but the combination is. Two browsers on two different machines almost never produce the same fingerprint, and the same browser produces the same fingerprint visit after visit, even when the user clears cookies, switches to incognito, or creates a new account.
Fingerprinting fills the gap left behind by cookies and IP addresses. Cookies are easy to clear and don't survive incognito mode. IP addresses change every time someone switches networks or flips on a VPN. Fingerprints persist through both, which is exactly what you need when the same person keeps coming back wearing a different disguise.
The Dregs tracking script collects browser and hardware signals on page load and computes a 50-character fingerprint composed of three parts:
Splitting the fingerprint this way means Dregs can recognize a returning device even when its environment has changed. A user who updates Chrome, switches keyboards, or adds a browser extension still hashes to the same stable component, which is the part that matters for catching the same device across multiple accounts.
Here's what Dregs sees about the browser you're reading this on.
Every device record exposed through the REST API and dashboard includes:
The tracking script collects all of this automatically. There's nothing to configure, just drop the script into your website or web application and Dregs will start tracking devices and fingerprints.
Plenty of services will sell you a device fingerprint as a primitive, and there are even open source libraries that you can use for free. But Dregs goes further: every fingerprint is part of an identity graph, which is where most fraud actually lives.
Dregs automatically flags devices used by more than one identity and reflects it in the Uniqueness score. A returning freeloader who creates a fresh account on the same laptop drops the new account's Uniqueness score within seconds.
When a device links two or more identities, Dregs records the relationship and surfaces it in your dashboard and through the API. You can walk the graph from a single account to every other account linked to the device.
Every fingerprint comes with the device's network and geographic context. Data-center ASNs, impossible travel between events, and rapidly churning IP addresses all feed into the Behavior score alongside the device signals.
Your office machines, QA bots, and internal test devices share fingerprints with real users and would otherwise distort scoring. Mark a device or identity as disregarded and Dregs excludes it from shared-device analysis.
Device fingerprinting is powerful, but it isn't invincible. A determined attacker with the right tools can change enough signals to produce a different fingerprint by using virtual machines, anti-detect browsers, and possibly even hardware swaps. Two devices with truly identical hardware and software (think a corporate laptop fleet imaged from the same template) will sometimes share a fingerprint.
That's why Dregs treats the fingerprint as one signal among several. It's the strongest single signal for catching repeat users, and the foundation of the Uniqueness score... but the Authenticity, Humanity, and Behavior scores look at the rest of the picture too, so a single bypassed signal doesn't break the detection.
Device fingerprinting is instrumental for detecting many of the abuse patterns Dregs is designed to fight.
Catch the same person signing up for a fresh trial on the same laptop, even with a brand-new email address.
Link multiple accounts back to a single device and a single person, regardless of how different the profiles look.
Spot self-referrals where the referrer and referred account share a device — the most common shape of referral abuse.
With Dregs, device fingerprinting isn't a separate product or an add-on tier. It's part of every Dregs plan, billed against the same active-identity meter as the rest of the platform. Plans start at $17/month and include unlimited device fingerprints — see the pricing page for the details.
A: Yes. Fingerprinting reads hardware and software signals that don't change between normal and private browsing: GPU, CPU cores, screen resolution, timezone, fonts, and so on. The same browser produces the same stable fingerprint whether the user is in a normal window, an incognito window, or a fresh profile, and that's exactly what makes it useful for catching duplicate accounts.
A: Dregs fingerprinting doesn't use cookies, localStorage, or any persistent client-side storage to compute the fingerprint, so it doesn't trigger most cookie-banner requirements. That said, fingerprinting is still considered personal data under GDPR and similar regimes, so you should disclose it in your privacy policy and make sure you have a lawful basis for processing (legitimate interest for fraud prevention). Talk to your own counsel for jurisdiction-specific advice.
A: FingerprintJS and Fingerprint.com sell device fingerprinting as a primitive. You get a stable visitor ID and risk signals, then it's on you to build the fraud detection on top. Dregs ships fingerprinting as part of a full identity-based fraud detection platform: shared-device detection, identity relationship graphs, behavioral scoring, badges, and escalations are all built in and tied to the fingerprint automatically. If you only need a visitor ID primitive, those tools are a better fit. If you're trying to actually stop free trial abuse and duplicate accounts, Dregs does the whole job.
A: A determined attacker with virtual machines, anti-detect browsers, or hardware swaps can produce a different fingerprint, and that's why Dregs treats the fingerprint as one signal among several. The Authenticity, Humanity, and Behavior scores look at email patterns, automation signatures, and usage behavior, so a single bypassed signal doesn't break detection. Most real-world abusers will just start a new incognito session or clear cookies and try again, which fingerprinting catches.
A: Two different devices producing the same fingerprint is rare but possible, like when a corporate fleet of identical laptops is imaged from the same template. The same device producing different fingerprints across visits is also rare and usually triggered by a major browser or OS update. Dregs splits the fingerprint into stable and unstable components specifically to recognize a device through environmental change, which keeps the false-negative rate low without inflating false positives.
A: Yes. The tracking script collects the same hardware and software signals from mobile browsers that it does on desktop. Mobile fingerprints tend to be slightly less unique than desktop fingerprints because of more uniform device populations (a million iPhone 15s look very similar to each other), so on mobile the fingerprint pulls extra weight from network and behavioral signals. For native iOS and Android apps, you'd need to integrate at the SDK level.
Drop the Dregs tracking script into your application and start collecting device fingerprints, IP intelligence, and shared-device signals from the very first page load.
Schedule a Demo