{"id":7186,"date":"2024-11-04T00:00:00","date_gmt":"2024-11-03T16:00:00","guid":{"rendered":"https:\/\/www.fraudlabspro.com\/resources2\/tutorials\/what-is-user-network-graph\/"},"modified":"2026-04-02T18:33:36","modified_gmt":"2026-04-02T10:33:36","password":"","slug":"what-is-user-network-graph","status":"publish","type":"docs","link":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/","title":{"rendered":"What is User Network Graph"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1275\" height=\"638\" src=\"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph.png\" alt=\"What is User Network Graph\" class=\"wp-image-4623\" srcset=\"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph.png 1275w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph-300x150.png 300w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph-1024x512.png 1024w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph-768x384.png 768w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph-50x25.png 50w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph-920x460.png 920w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph-600x300.png 600w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph-320x160.png 320w\" sizes=\"auto, (max-width: 1275px) 100vw, 1275px\" \/><\/figure>\n\n\n\n<p>In today\u00e2\u20ac\u2122s world, where e-commerce is booming and online transactions are increasing, preventing fraud and ensuring user legitimacy are paramount. For merchants, it\u00e2\u20ac\u2122s crucial to have tools that help them understand the behaviors and connections of their customers and one such tool is the User Network Graph. This feature is an essential asset in fraud prevention and user verification, providing merchants with a clearer view of how different transactions are interconnected through shared attributes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding the User Network Graph<\/h2>\n\n\n\n<p>A <strong>User Network Graph<\/strong> is a dynamic visual tool that maps the connections between different pieces of user information in an online transaction. At its core, the graph starts with the email address provided in an order and then branches out to show connections to other attributes, such as the name, phone number and device ID associated with that email. The purpose of this graph is to identify if there are any common elements shared across multiple email addresses, names, phone numbers or device IDs.<\/p>\n\n\n\n<p>For instance, if two orders have the same device ID but different email addresses or if the same phone number appears across multiple orders with different names, these may be signs of fraudulent behavior. The network graph enables merchants to see these linkages at a glance, simplifying the process of investigating potentially suspicious orders.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of the User Network Graph<\/h2>\n\n\n\n<p>The User Network Graph offers several powerful benefits for merchants, especially those aiming to improve their fraud detection and prevention capabilities. Here are some key advantages of using this feature:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enhanced Fraud Detection<\/h3>\n\n\n\n<p>The primary benefit of the User Network Graph is its ability to improve fraud detection. By viewing relationships between transactions, merchants can spot patterns that might indicate fraudulent behavior. For instance, if multiple accounts with different names and addresses are linked through a single IP address or device fingerprint, this could signify account takeover or synthetic identity fraud.<\/p>\n\n\n\n<p>Fraud rings often create multiple fake accounts or use stolen identities to perform fraudulent transactions on a single platform. By analyzing the User Network Graph, merchants can detect these fraud rings more effectively. Instead of treating each transaction in isolation, they can view the broader network and investigate suspicious connections, leading to quicker identification and mitigation of fraud.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Streamlined Transaction Analysis<\/h3>\n\n\n\n<p>Examining each transaction individually can be time-consuming and challenging, especially when merchants are handling a high volume of orders. The User Network Graph provides a consolidated view, making it easier for merchants to understand the context of each transaction within a larger network of interactions. This streamlining is invaluable for merchants who want to perform thorough yet efficient transaction analyses.<\/p>\n\n\n\n<p>Instead of manually comparing details across multiple transactions, the User Network Graph automatically highlights relationships and similarities. This allows merchants to focus their attention on analyzing key patterns, saving time and resources that would otherwise be spent on manual checks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improved Decision Making<\/h3>\n\n\n\n<p>With the visual insight provided by the User Network Graph, merchants can make better-informed decisions when determining whether to approve, flag or reject a transaction. Seeing how transactions are interconnected helps merchants assess the level of risk associated with specific transactions and prioritize investigations where needed.<\/p>\n\n\n\n<p>For instance, if a high-value transaction is linked to other transactions associated with suspicious activity, a merchant may choose to investigate further or take preventive measures such as requesting additional verification from the user. This improved decision-making can significantly reduce the risk of fraud while maintaining a positive customer experience for legitimate buyers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Access the User Network Graph<\/h2>\n\n\n\n<p>For merchants on the <a href=\"https:\/\/www.fraudlabspro.com\/pricing\" target=\"_blank\" rel=\"noreferrer noopener\">Medium plan<\/a> or above, the User Network Graph can be accessed within the Transaction Details page in the <a href=\"https:\/\/www.fraudlabspro.com\/merchant\/transaction\" target=\"_blank\" rel=\"noreferrer noopener\">merchant area<\/a>. Merchants can click on the User Network Graph tab to view the graph. The graph display connections through various identifiers, such as email addresses, name, phone number and device ID. Merchants are able to click on the email address node in the graph to view additional transaction by the same email address. Note that the network graph is generated based on merchants own data transaction from the past six months.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1468\" height=\"862\" src=\"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot.png\" alt=\"Example of User Network Graph in the Transaction Details page Merchant area.\" class=\"wp-image-4617\" srcset=\"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot.png 1468w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot-300x176.png 300w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot-1024x601.png 1024w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot-768x451.png 768w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot-50x29.png 50w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot-920x540.png 920w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot-600x352.png 600w, https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/screenshot-320x188.png 320w\" sizes=\"auto, (max-width: 1468px) 100vw, 1468px\" \/><\/figure>\n\n\n\n<p>In summary, the User Network Graph is a powerful tool that allows merchants to detect patterns of fraud that may otherwise go unnoticed. By visualizing connections between email addresses, names, phone numbers and device IDs, merchants can make better-informed decisions and streamline the review process. With fraud threats continually evolving, tools like the User Network Graph equip merchants with the insights they need to stay one step ahead and ensure secure, trustworthy transactions.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Secure Transactions, Seamless Business<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Say goodbye to fraud worries! Secure your online store with FraudLabs Pro now.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-1 wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button has-text-align-center\" style=\"width:100%;\"><a id=\"btn-click\" class=\"wp-block-button__link has-white-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.fraudlabspro.com\/checkout-micro?utm_source=blog&#038;utm_medium=link&#038;utm_campaign=cta&#038;utm_term=footer-free\" style=\"background-color:#ed4747;margin:0px 10px 10px 10px;width:auto;\" target=\"_blank\" rel=\"noreferrer noopener\">Get Started For Free Now<\/a><a id=\"btn-click\" class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/www.fraudlabspro.com\/pricing?utm_source=blog&#038;utm_medium=link&#038;utm_campaign=cta&#038;utm_term=footer-paid\" style=\"margin:0px 10px 10px 10px;color:#ed4747;border:1px solid #ed4747;background-color:#ffffff;width:auto;\" target=\"_blank\" rel=\"noreferrer noopener\">Unlock Premium Features<\/a><\/div><\/div>\n\n\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today\u00e2\u20ac\u2122s world, where e-commerce is booming and online transactions are increasing, preventing fraud and ensuring user legitimacy are paramount. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_lmt_disableupdate":"","_lmt_disable":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"doc_category":[184],"doc_tag":[],"class_list":["post-7186","docs","type-docs","status-publish","hentry","doc_category-general-topics"],"year_month":"2026-05","word_count":754,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"FraudLabs Pro","author_nicename":"jhchew","author_url":"https:\/\/www.fraudlabspro.com\/resources\/author\/jhchew\/"},"doc_category_info":[{"term_name":"General Topics","term_url":"https:\/\/www.fraudlabspro.com\/resources\/categories\/general-topics\/"}],"doc_tag_info":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is User Network Graph -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is User Network Graph -\" \/>\n<meta property=\"og:description\" content=\"In today\u00e2\u20ac\u2122s world, where e-commerce is booming and online transactions are increasing, preventing fraud and ensuring user legitimacy are paramount. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T10:33:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1275\" \/>\n\t<meta property=\"og:image:height\" content=\"638\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/\",\"url\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/\",\"name\":\"What is User Network Graph -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/flp-user-network-graph.png\",\"datePublished\":\"2024-11-03T16:00:00+00:00\",\"dateModified\":\"2026-04-02T10:33:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/flp-user-network-graph.png\",\"contentUrl\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/flp-user-network-graph.png\",\"width\":1275,\"height\":638},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/what-is-user-network-graph\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/tutorials\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is User Network Graph\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/#website\",\"url\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/\",\"name\":\"\",\"description\":\"Resources About FraudLabs Pro Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fraudlabspro.com\\\/resources\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is User Network Graph -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/","og_locale":"en_US","og_type":"article","og_title":"What is User Network Graph -","og_description":"In today\u00e2\u20ac\u2122s world, where e-commerce is booming and online transactions are increasing, preventing fraud and ensuring user legitimacy are paramount. [&hellip;]","og_url":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/","article_modified_time":"2026-04-02T10:33:36+00:00","og_image":[{"width":1275,"height":638,"url":"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/","url":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/","name":"What is User Network Graph -","isPartOf":{"@id":"https:\/\/www.fraudlabspro.com\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/#primaryimage"},"image":{"@id":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/#primaryimage"},"thumbnailUrl":"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph.png","datePublished":"2024-11-03T16:00:00+00:00","dateModified":"2026-04-02T10:33:36+00:00","breadcrumb":{"@id":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/#primaryimage","url":"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph.png","contentUrl":"https:\/\/www.fraudlabspro.com\/resources\/wp-content\/uploads\/2024\/11\/flp-user-network-graph.png","width":1275,"height":638},{"@type":"BreadcrumbList","@id":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/what-is-user-network-graph\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fraudlabspro.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.fraudlabspro.com\/resources\/tutorials\/"},{"@type":"ListItem","position":3,"name":"What is User Network Graph"}]},{"@type":"WebSite","@id":"https:\/\/www.fraudlabspro.com\/resources\/#website","url":"https:\/\/www.fraudlabspro.com\/resources\/","name":"","description":"Resources About FraudLabs Pro Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fraudlabspro.com\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/docs\/7186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/comments?post=7186"}],"version-history":[{"count":0,"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/docs\/7186\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/media?parent=7186"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/doc_category?post=7186"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/www.fraudlabspro.com\/resources\/wp-json\/wp\/v2\/doc_tag?post=7186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}