API
Documentation

Documentation for using the API Waiapay

Do you have any doubt? Here you can find information about the APIS we offer.


Getting started is easy!


Welcome to Waiapay API.

Just click on one of our services and we will give you more information about its use.

API BLACKLIST CARD

This api is available for companies that need verify payments and need consult if the cards are in blacklist as cloned or hacked. Improves fraud detection rate. Reach up to 80% success to prevent fraud in the global market.

API
TOKENIZER

Our tokenization software is the process of turning sensitive data into non sensitive data called tokens, that can be used in a database or internal system without bringing it into scope, these tokens are the new data of credit card, your company could need this API. Also our system tokenizes documents such as passports, identification documents and others.

FRAUD PREVENTION WAIAPAY

To protect customer accounts and information of credit cards. Control user flow to reduce fraud rates and increase conversions. Easily implement data enrichment and improve decision-making with our special system based on artificial intelligent Machine and deep learning, Improves fraud detection rate. Reach up to 80% success to prevent fraud in the global market.

BIG DATA FINANCIAL ANALYTICS

This tool is a service that offer Waiapay for companies that need verify risk in credits, we verify and analyze the information of each client. Waiapay verify emails, most accurate and insightful address investigation on the market by applying deep profiling and domain verification tools.



API
PAYMENT

This Api is a solution for companies such as E-commerces, Payment Gateways or any solution that needs to process a payment by credit and debit card, we can process more than 136 different types of currencies.


API ANALYTICS TOOL

This service allows companies to carry out analysis of fraud behavior, techniques and places where this type of incident is more common. Detect connection methods and mitigate risks associated with certain proxies, virtual private networks, or TOR browser users.