Bonus abuse and multi-accounting cost iGaming operators 4–7% of GGR — and the professional bonus-hunter class has fully adopted residential proxies and antidetect browsers. Same operator, same household, 200 unique "customers" each claiming the welcome bonus, each on a different IP, each with a different fingerprint. KYC alone never catches them. The operators who stop the bleed are the ones treating bonus abuse as a device-cluster problem, not an identity problem.
This piece is for sportsbook and online-casino fraud, payments, and platform teams. It covers the actual bonus-hunter workflow as we observe it, the regulatory dimension (UKGC, MGA, ARJEL), the signals that work in 2026, and a deployable detection plan that doesn't kill conversion on legitimate first-time depositors.
What "bonus abuse" actually means in 2026
Three distinct behaviors get bundled under the term, and they need different responses:
- Welcome-bonus farming (multi-account). One person, many accounts, each claiming the new-customer bonus. Pure economic loss. Often part of an organized ring with shared payout infrastructure.
- Matched betting / bonus-arbitrage. One person, one account, but the user's lifetime value is engineered to be the bonus value minus wagering EV. Legal in most jurisdictions; commercially negative for the operator.
- Self-excluded re-registration. A previously self-excluded player creates a new account under a different identity. Regulatory exposure on top of commercial loss — UKGC and MGA both treat failure-to-detect as a licensing concern.
The first two are economic problems. The third is a compliance problem with regulator-imposed deadlines for remediation when caught.
The professional multi-accounting workflow
An operationally typical bonus-farming setup, observed in instrumented data:
- Identity supply. Synthetic identities (real-but-rented IDs from underground markets) or aged accounts on adjacent KYC-passing platforms. Cost: $15–$60 per identity for tier-1 jurisdictions.
- Payment supply. Prepaid cards, cashback debit cards, and increasingly crypto on-ramps that sidestep card-issuer KYC. Some rings use the same card across accounts via aliasing techniques specific to certain prepaid programs.
- Browser supply. Multilogin or Kameleo. One unique fingerprint per account: distinct canvas, distinct WebGL renderer, distinct timezone, distinct language preference, distinct font set.
- Network supply. Residential proxy pool. Each account assigned a "sticky" residential exit (BrightData, Oxylabs, IPRoyal, ShadowNode) for the duration of its lifecycle — sometimes weeks, to make the IP-and-device pair age into looking organic.
- Play supply. Either manual (a small team executing wagering) or scripted (Selenium/Playwright with stealth plugins) running the minimum-wagering bet pattern. Slots: minimum bets on low-volatility games. Sportsbook: matched bets against an exchange.
- Withdrawal aggregation. The 200 individual withdrawals collapse into a few payout endpoints — bank accounts, crypto wallets, e-wallets — that the ring controls.
Step 6 is the single most reliable retroactive signal. Even with perfect device-and-IP separation per account, the bonuses aggregate at the cashout layer. If your fraud team isn't running cashout-clustering retrospectively, you're missing the cleanest disambiguation in the entire stack.
Why traditional KYC alone fails
KYC verifies identity-document-to-real-person. It does not verify this person has not previously played here under a different identity. The gap is structural:
- A real ID can be rented for $30–$80 per claim cycle. KYC passes.
- Family members, flatmates, and paid identity-rental networks supply real, legally-distinct identities that all live in one household and play through one device.
- A self-excluded player using their cousin's ID is invisible to KYC by definition. The cousin is a real, eligible person.
Identity-layer defenses must be paired with device-layer defenses. Neither alone is sufficient.
The signals that catch professional bonus abuse
1. Device fingerprint clustering at registration
The single highest-yield signal in the entire stack. At signup, capture a stable visitorId derived from canvas, audio, WebGL, hardware concurrency, and 100+ other low-entropy signals. Index every account by visitorId. When registration N+1 arrives at a visitorId that already has N accounts, you don't need to know who the user is — you know there are N+1 accounts on one device and only one of them gets the bonus.
Threshold heuristics that work:
- visitorId with 1 account → allow, normal first-time depositor.
- visitorId with 2 accounts, different KYC, different timezone-of-play → allow but flag for monitoring (likely household).
- visitorId with 3+ accounts → bonus-eligibility is for the first account only. Subsequent accounts allowed to play with own money but not eligible for promotional offers.
- visitorId with 5+ accounts in any 90-day window → operationally an abuse ring. Block bonus claims, freeze pending bonus withdrawals, queue for fraud-team review.
2. Antidetect browser detection
Multilogin, Kameleo, GoLogin, AdsPower, and Dolphin{anty} are not used by legitimate iGaming customers. Detection of any of these at the registration or deposit surface is extremely strong evidence of bonus-farming intent. How to detect antidetect browsers in 2026 covers the technical signals; for iGaming specifically, the false-positive rate of antidetect detection on legitimate first-time depositors is essentially zero.
3. Residential proxy detection
Legitimate iGaming customers in regulated jurisdictions almost never connect through residential proxies. Geolocation-restriction-bypass via VPN does happen for casino/sportsbook customers in restrictive jurisdictions, but the residential-proxy specifically is fraud-correlated at >95% in our instrumented data. The complete guide to residential proxy detection covers the ASN and device signals.
4. Payment-instrument clustering
Hash payment instruments (BIN + last4 + expiry tuple, hashed-and-truncated cardholder name) and cluster across accounts. Distinct accounts depositing from the same hashed instrument are a multi-account ring with high specificity. The corresponding signal at withdrawal — distinct account payouts to the same IBAN, same crypto wallet, same e-wallet email — is the cleanest cashout-cluster signal.
5. Behavioral play-pattern matching
Self-excluded re-registration specifically: the original excluded account has a behavioral baseline (game preferences, average bet size, session duration distribution, pattern of wagering vs. cashout). When a new account from a different identity but the same device starts producing the same baseline, that's the same player. This is the regulatory-defensible signal: a UK/Malta regulator inquiry will accept "device match + behavioral match" as actionable evidence; "device match alone" is sometimes contested.
The detection stack, deployed
A working production order:
- Registration: capture
visitorId, runPOST /v1/evaluateto get residential-proxy, antidetect, automation, and risk-score signals. Block clear-fraud (antidetect + residential proxy combination, automation detected) at registration. Flag medium-risk for downstream gating. - Deposit: re-evaluate. New device since registration → step-up. Antidetect now appearing → freeze deposit, manual review.
- Bonus claim: check
visitorIdagainst the index of prior bonus-claiming accounts. If the device has previously claimed a welcome bonus on any account, block the claim with a "bonus already claimed on this device" message. Hash-clustered payment instrument matches against prior bonus claims also block. - Wagering and play: behavioral-baseline collection. Establish per-user norms within the first 30 sessions. Used downstream for re-registration detection and for matched-betting flagging.
- Withdrawal: cashout cluster lookup. Three accounts paying out to the same crypto wallet in 60 days → pause all three pending review.
- Self-exclusion event: hash and persist the
visitorId, the device profile, the payment-instrument cluster, and the behavioral baseline. On every future registration, cross-check.
Bonus-claim policy that actually works
The bonus-claim block is the highest-value lever. Policies we've seen work in production:
- Bonus eligibility is per-device, not per-account. One welcome bonus per device (visitorId). One reload bonus per device per offer cycle. Legitimate household sharing collapses cleanly into this — most households have one primary gambler, and the secondary gambler can play without a bonus or claim a smaller "second-account bonus" with stricter wagering. Most bonus-farming rings break completely.
- Bonus eligibility is per-payment-instrument cluster. One welcome bonus per BIN+last4+holder-name cluster. Catches the common "rented prepaid card pool" pattern.
- Step-up before bonus credit. Identity confirmation (selfie + ID, or banking ID where available) before the bonus is credited, not before the account is created. This shifts friction to the moment-of-claim, not registration — better signup conversion, better fraud filtering.
- Bonus-cap by risk score. The full welcome bonus available to risk-score < 30. Reduced offer for 30–60. No promotional offer for > 60 (account allowed to play with own funds only).
Regulatory dimension
UK Gambling Commission, Malta Gaming Authority, and ARJEL (France) all impose specific requirements on detecting self-excluded re-registration. The required posture is "reasonable steps", not perfection — but "reasonable" has been interpreted in recent enforcement actions to include device-fingerprinting where it's commercially available. Operators relying solely on identity-document checks have been fined; operators with documented device-and-behavioral controls have generally not been.
The defensible audit trail when an inquiry lands: a re-registered self-excluded player flagged at signup by visitorId match, escalated to manual review, and either blocked at signup or blocked at first deposit. Showing the regulator the exact event log with the device-match signal and the timestamp of intervention is the cleanest possible defense.
How Sentinel fits
The POST /v1/evaluate endpoint returns the relevant signals in one sub-40ms call:
visitorId— stable device identity for cluster indexing.residentialProxy,vpn,tor,dch— network-layer flags.antidetectBrowser+antidetectProduct— Multilogin/Kameleo/GoLogin/Dolphin{anty}/AdsPower flags.browserTampering— float 0–1 catching the cookie-import / fingerprint-spoof case.automationDetected— Selenium/Puppeteer/Playwright detection at the registration or wagering surface.riskScore— 0–100 composite for the simplest possible "block / step-up / allow" gate on bonus claims.
Free tier (1,000 requests/hour) is enough to instrument an iGaming registration and deposit surface. /for/gaming has the operator-specific details. The typical instrumented finding in the first 30 days is 3–5× more bonus-abuse rings than the operator's existing internal heuristics were catching.
Bonus abuse is solvable. The operators who solve it are the ones who stop treating it as a one-account-at-a-time identity problem and start treating it as a device-cluster + cashout-cluster problem. The signals exist. The integration is one API call. The economic return on the first month of deployment is, for most mid-tier operators, larger than the entire annual fraud budget.