Only available on the Pro plan.

Overview

Anomalies help you monitor your financial data, flag suspicious activities in real-time, and notify you to take action. Blnk currently flags anomalies based on pre-configured rules built into your Cloud workspace.

Anomaly types

There are three anomaly types — balances, transactions, and identities.

Balance anomalies

These anomalies are flagged when suspicious activities are detected in one or more balances.
  • Increased credit/debit frequency detected: Frequent unexpected credit/debit transactions above normal activity patterns may indicate account irregularities or potential unauthorized access.
  • Unusual repeated transactions: Repeated transactions with consistent amounts and timing that deviate from established patterns may signal automated fraud attempts or account tampering

Transaction anomalies

Transactions get flagged due to:
  • Suspicious time of transaction: Activity occurring outside established operating timeframes or expected business cycles warrants additional verification to ensure transaction legitimacy.
  • Suspicious transaction keywords: Analysis of transaction descriptions identifies keywords associated with high-risk activities, suspicious patterns, or prohibited transactions.
  • High-risk locations: Transactions involving jurisdictions identified as having elevated financial crime risk or inadequate compliance frameworks require enhanced scrutiny and additional due diligence measures.

Identity anomalies

Identities get flagged due to:
  • PEP or sanctions list match: he identity has matched against records in politically exposed persons databases or international sanctions lists, requiring verification and review.
  • High-risk locations: The identity is associated with a jurisdiction designated as high-risk, necessitating additional verification steps and enhanced due diligence procedures.
  • Unusual activity by senior customer: Unusual transaction patterns or account activities are detected on accounts belonging to elderly customers, triggering enhanced monitoring protocols.

Anomaly statuses

There are three anomaly statuses: FLAGGED
  • The system creates an initial notification requiring investigator review.
  • Each flagged case enters a queue for assignment to the investigative team.
  • Automated alerts are sent to relevant compliance personnel.
INVESTIGATING
  • An assigned investigator begins analyzing the full anomaly trail.
  • The system tracks all investigative actions in a detailed audit log.
  • The case handler documents findings and evidence during review.
RESOLVED
  • The investigation concludes with a formal determination.
  • All required regulatory reports are filed if suspicious activity is confirmed.
  • The final case report documents actions taken and resolution details.

Need help?

If you’re having trouble with Blnk Cloud, don’t hesitate to send us a message via email at support@blnkfinance.com or send us a message here.