City, State Vienna (Vienna)
Zip Code 1090
Language German (DE)
Calling Code +43
Time Zone CEST
Currency Euro (€)
International Format 188.8.131.52
Local format 6830
IPRN detected? No
Dialer detected? No
Wangiri detected? No
Threat Level Low
Potential Threat Types
We provide a fast & secure Number Intelligence API backed by accurate data of past and imminent Threats.
Accurately validate phone numbers and stop fraudulent activity.
Check if a phone number is listed in any of 9.3+ Million Threat Database instantaneously.
Receive realtime fraud and abuse alerts for traffic originating & terminating on your numbering ranges.
Validate numbers with no CDR uploads, no upfront cost or investment.
Aimed at all types of fraud connected with international voice. It can work side-by-side with other existing solutions.
We update our database from hundreds of data sources roughly every 5 minutes.
From a thousand requests a month to several million a day — our scalable cloud infrastructure has got you covered at any stage.
Years of data collection and long-term partnerships with large Carriers ensure the highest quality blacklist database currently on the market.
Our number validation web services (API) can be deployed in a matter of hours. Ideal for VoIP providers, call centers & Enterprises.
Validate 1.000 numbers / month for free. Premium plans start at $9.
Affordable for any sized business to secure their communications.
We provide affordable tools for any sized business to protect their communications against telecom and VoIP fraud.upCOM Labs has developed the most complete real-time threat database in the telecom industry. We update our database from hundreds of data sources and make this data available thru our Number Intelligence API.
We provide real-time fraud protection to FMS providers, Telecom carriers, MVNO's and Developers by identifying suspicious and fraudulent numbers.
Our API can be setup in a matter of hours and is platform agnostic, it can be used on Softswitches, ERPs, FMS solutions or virtually any platform. We offer unsurpassed visibility and automation to protect today’s rapidly changing telecom environments against increasingly sophisticated threats.
By integrating our data businesses can protect themselves from current and emerging IRSF Fraud attacks and prevent losses from high exposure activities.
The company members have been working in the Telecom and Cyber-Security industry for over 15 years.
Our commitment at upCOM is to deliver the highest standard of customer service, while providing a leading-edge fraud numbering database with real-time updated and the highest availability.
We are commited to be the most complete, flexible and effective IRSF Fraud prevention and detection tool in the industry. Our platform ingests, analizes and processes large quantities of data every minute, ensuring the highest fraud-protection and risk mitigation.
Consequently, we have the necessary knowledge to create, establish or provide ad hoc services or to be a permanent external team that fulfills your business needs on the IRSF Fraud field.
Helping telecom fraud management teams break down big data.
"The features upCom provides help us manage our telecommunications, and give us peace of mind, knowing our systems have an added layer of security."
" The analytics dashboard gives us quick and consolidated overviews of our customers traffic across all our points of presence"
-Business Development Manager
" I could set my call center in matter of minutes, and it is very easy to use! That has helped us to make sure that we would not lose any money on unwanted calls. "
Start today Get in touch with a Telecom Fraud Specialist
With the fast adoption of voice over IP (VoIP) services, the number of vulnerabilities and threats to the voice network are also growing.
Attacks to a VoIP network can happen anywhere from within the underlying network, transport protocols, VoIP devices, applications, underlying operating systems, and more. It is important that you have the necessary security measures in place before you deploy a VoIP service.
upCOM ensures that your system resources are always available for traffic from legitimate sources - to legitimate destinations, while blocking or mitigating attacks from rogue sources and rogue destinations.
Adapt strategy in the moment to minimize fraudulent calls and achieve your objectives.
Learn more about our product features, one of our specialised sales representatives will contact you shortly.