Antom, leading provider of tailored payment solutionsAntom, leading provider of tailored payment solutions

Lists

Lists are used to manage user information. You can create one or more lists, and when a user's information is added to a list, the corresponding rules are automatically applied. For example, if you add a user's email address into the allowlist, all transactions associated with that address will be approved, even if they trigger a deny rule.

List types

Antom Shield allows you to add specific list types. Currently available list types are as follows:

  • Buyer registration phone number
    The phone number used by the buyer to register in your business. Specified by the buyerPhoneNo parameter.
    Example: 861301111222.
  • Buyer email
    The buyer’s email address. Specified by the order.buyer.buyerEmail or order.shipping.shipToEmail (for virtual goods) parameter.
    Example: Pet***@email.com.
  • Buyer ID
    The buyer ID appearing in transaction information. Specified by the buyer.referenceBuyerId parameter.
    Example: Pet***@email.com.
  • Card hash
    The fingerprint is generated by encrypting card information in the transaction data.
    Each card number corresponds to a unique card fingerprint, which can be found on the transaction details page.
    Example: QOIURONSLFIUhX.
  • IP address
    The buyer’s IP address appearing in transaction information. Specified by the env.clientIp parameter.
    Example: 191.111.11.1.

Note:

  • Please ensure the user information submitted to Antom Shield is accurate for the list to be effective.
  • If you need to block transactions not supported by the list (e.g., transactions from certain card-issuing countries), you can use the custom rules feature in the Antom Shield Premium.

List creation steps

In the Shield menu, click Smart engine and select Blocklists or Allowlists to start creating a list.

  1. Click Add blocklist or Add allowlist.
  2. Input list type.
  3. Input the list contents.
  4. Select OK to save your list.

List management

You need to be cautious in deciding whether to add users to the list. Incorrectly adding a user to the allowlist will cause all subsequent transactions to pass, which may result in a loss of capital. Incorrectly adding a user to the blocklist will prevent subsequent transactions and reduce the success rate of transactions. Therefore, Antom Shield provides a list dashboard which helps you manage lists more easily.

Add or delete list data

In the Blocklists or Allowlists page, you can add or delete list entries (take the blocklist as an example):

  • Add list entries
    • Add individually: Click the Add blocklist button to add one or up to ten list entries according to the on‑screen instructions.
    • Add in bulk: Click the Batch import blocklist button to download the provided list template or upload your files according to the on‑screen instructions. You can add up to 100 list entries at a time.
  • Delete list entries: Click the three‑dot icon of the existing list to delete the list.

Quick list configuration with the AI assistant

Antom Shield’s AI risk control assistant, powered by natural language processing technology, enables quick list configuration through conversational interaction. You can describe your business requirements in everyday language, and the system will automatically analyze your intent, identify the list type and validity period, generate executable configuration suggestions, and allow one‑click application, significantly improving configuration efficiency.

You can start the AI risk control assistant in either of the following ways:

  • Click the AI risk control assistant icon in the upper‑right corner of the Antom Dashboard to start a conversation at any time.
  • After entering the list configuration page, the system will automatically invoke the assistant and guide you to complete the configuration through natural language.

When using the AI Assistant, you can describe your configuration requirements in natural language, for example:

  • Add xxx***@gmail.com and yyy***@163.com to the allowlist, and set the validity period as permanent.
  • Add the following IP addresses to the blocklist: 192.168.1.XXX, 203.0.113.XXX, and set the validity period to three months.

The system will automatically extract the key information below and generate a corresponding configuration preview. You can confirm the details and complete the addition with one click:

  • List type (allowlist or blocklist)
  • List content (variables such as IP addresses or email addresses)
  • Validity period settings

Specify list validity period

List data typically remains effective for an extended period. If you no longer need a list, you can delete it using the Delete button. For temporary allowances or blocks, select the effective date when creating the list.

Matched records

You can view the details of the daily matched records, analyze the matched records in the past seven days and view the Top 10 matched lists in the past 30 days to help you effectively manage your lists.

  • Daily matched blocklist/allowlist: You can the transaction details in the daily matched list here.This feature helps you to analyze and understand in depth which transactions are relevant to a specific list, so as to better understand the business dynamics.
  • Matched records within seven days: By viewing the hit records of the past seven days, you can effectively pay attention to the sudden increase or decrease of matched records. This change may reflect the impact of market dynamics, customer behaviors or other business factors, combined with your specific business situation, you can more accurately manage and optimize your list.
  • Top 10 matched blocklist/allowlist: The top 10 matched lists show the list which has the highest matched transaction in the past 30 days. This not only helps you identify which lists have the greatest impact on your business transactions, but also provides an important basis for subsequent marketing strategies and business decisions.