Unity Network · CLI Mini Guide

Caller ID CLI Testing Task

A quick guide to Unity's new opt-in CLI (Caller Line Identification) verification task. CLI uses real devices on live networks to validate caller identity data and help improve call routing quality while reducing spoofing and spam risk.

Overview

  • CLI tasks require an active Unity license.
  • CLI is opt-in and must be enabled by license operators.
  • CLI calls are live, real, and non-synthetic inbound calls.
  • CLI calls look like normal incoming calls.
  • CLI works globally and is carrier-agnostic.
  • Any SIM or eSIM that can receive incoming calls is supported.
  • CLI is compatible with iOS, even if “Unity connection” appears offline.

Notifications

  • • You receive a push notification when a CLI call arrives.
  • • You also see an in-app popup notification.

Missed calls

  • • Missing a CLI call is okay.
  • • You can still report a CLI call up to 24 hours after receipt.

SIM / eSIM requirements

  • • If your SIM or eSIM can receive incoming calls, it can run CLI tests.
  • • In most cases, no active balance is needed to receive the call; however, some carriers may require one.

Rewards

Unity Points are distributed immediately after a valid CLI task is completed.

Why CLI testing matters

Calling Line Identification (CLI) is what lets recipients see caller number details during call setup. Accurate CLI builds trust, improves answer rates, and helps telecom operators identify route issues and fraud patterns, including False Answer Supervision (FAS).

CLI identification

Correct caller identity helps legitimate callers avoid being flagged as spam.

Spoofing mitigation

Testing surfaces misrepresented caller IDs and helps reduce abuse by malicious actors.

Higher answer rates

Verified caller IDs reduce spam flags and improve successful call connections.

What is spoofing?

CLI spoofing is when a caller intentionally falsifies caller ID data shown on the recipient device to hide identity or location and increase perceived legitimacy.

Local call spoofing

Fraudsters present local-looking numbers (or impersonate trusted entities) to gain credibility and trick users into sharing sensitive information.

International call spoofing

Fraudsters use international-style caller IDs to hide call origin, evade controls, and sometimes trigger callback fraud scenarios.

  • • Fraudsters may rotate spoofed numbers continuously to evade fraud management detection.
  • • Wangiri campaigns may spoof high-cost destinations to drive expensive callbacks.
  • • Call refiling can alter originating metadata to bypass normal routing and tariff controls.