Billing Address - The Card Owners Address
Drop Address - The house or lo of where you drop your carded goods
Cardholder - Owner of the card
Area Code - Is the first three digits of your telephone number.
CVV, CVV2 - The 3 or 4 numbers
that are in the front or back of a card
BIN - The first 6 numbers of a credit/debit card. It tells you what bank issued the
card. EX;
473702 [Wells Fargo]
Slipn - Synonym to the word “Cheque”
CC - Credit Card
LINKABLE - A card that links to your CASH-APP or Apple Pay which is predominantly
advertised by scammers
Cash Out - Converting the balance available on a card, like a prepaid card or gift
card, into actual cash.
Open-up/Self-reg - A bank or a VCC (virtual credit card) created under a fullz.
VCC - Virtual Credit Card.
Example: Cash App
VBV - Verified By Visa
Non VBV - Not Verified By Visa
Proxy - A proxy is like a middleman that hides your internet identity by connecting
to websites on your behalf.
VPN - Software used to encrypt and tunnel all your traffic so your ISP won't be
able to see what websites or resources you are accessing. It's important that the
provider of VPN won't log your connections, so the government won't be able to find
any traces of your traffic.
Logs - Short for login. A stolen account information that was cracked and sold. EX;
Username:Pass or Email:Pass.
Doxx - Doxxing is when someone publicly shares private or personal information
about another person without their consent, often with harmful intent.
TLO - A TLO (similar to doxxing) refers to the act of finding and publicly sharing
someone's personal information without their consent. This can include things like
their address, phone number, or other sensitive data, often with malicious intent.
DL - Drivers License
Fullz - A complete set of someone's personal information. This can include details
like their full name, address, date of birth, Social Security number, and credit
card information
CPN - A CPN, or Credit Privacy/Profile Number, is a nine-digit number that some
companies falsely market as a way to hide or repair bad credit by using it instead
of your Social Security Number (SSN)
RDP - The RDP is an acronym for the Remote Desktop Protocol. It allows you to
connect to another computer remotely. Let’s you control another computer as if you
were sitting right in front of it
Drops - [Has Many Terms]
- Drop: Dropping logs (logins) for free, typically vendors do this.
- Drop: A location where your carded goods are going to
- Drop: An account registered under someone else’s personal information
Carding - Carding is the process of trafficking credit cards and other related
information online. Extensively, it is the process of billing top websites like
Amazon, Nike, BestBuy, iTunes, etc. Just know that there are punishments for credit
card fraud. So don’t say I didn’t tell you.
Carder - Is who you are.
Conventional CC - The regular CC you mostly find online, and it is less expensive.
However, you can’t use it for so many carding processes due to limited details. It
can only work on weaker websites.
Details in Regular CC:
Name:
State:
Address:
City:
Postal Code:
Telephone Billing Number:
Card Number:
EXP.:
CVV:
Partial Full CC - You can card sites like PayPal with these extra details. The
partially full CC includes more CC details, including:
D.O.B.:
SSN:
Mother’s Maiden Name:
Full CC or CC Fullz - This CC is quite expensive, but it provides all the details
to card any platform. The extra details in full CC include:
Bank Name:
Account Number:
Routing Number:
Bank Number:
Drivers License Number:
CC PIN:
Statuses of CC:
Live CC: A CC with valid details. It can be a CC fullz, half CC fullz, etc. This
status signifies that you can use the CC for completing any transaction
successfully.
Dead CC: The dead CC is CC with Invalid details. In this case, the accompanying
information may have been retired or do not exist.
Enroll - Cards with online banking access that can be registered to bank accounts.
Requires SSN and specific BINs to sign up. Allows viewing transactions and some
BINs let you change billing address
AVS - Address verification system used by merchants for certain countries
(US,CA,UK,etc) to check if billing address matches card records. Important security
measure which means you need accurate billing information to process transactions.
Visa Alerts - Notification system that sends text/email alerts for card
transactions. Useful for low-value transactions that need minicode
Cloning - Process of copying card data onto blank cards to create physical
duplicates. Requires dumpsMSR and
proper encoding settings
MSR - Magnetic stripe reader device reads and writes card data to magnetic stripes.
Used to create physical cloned cards from dumps
EMV - Chip cards contain a secure microchip that makes them harder to clone than
magnetic stripe cards. Most modern cards use EMV technology.
Dipping - Dipping a cloned card multiple times to force terminal to use magstripe
instead.
NFC - Contactless payment technology in cards lets you tap to pay. Mostly used on
phones with data stored digitally.
Skimmer - Device installed on card readers to steal card data when cards are
swiped. Common on ATMsand gas pumps
POS - Point of sale terminal processes card payments at stores. Some terminals are
more vulnerable to attacks than others
ATM - Automated teller machines dispense cash and accept deposits. Popular target
for skimmers and shimming devices
Antidetect - Browser software that generates unique fingerprints to appear as
different users. Needed to avoid browser fingerprinting detection
Antifraud - Security systems that detect and block fraudulent transactions. Uses AI
machine learning and risk scoring to identify suspicious patterns
Fraud Score - Numerical value assigned to transactions based on fraud likelihood.
Higher scores mean higher chance of being blocked
Fingerprint - Unique combination of browser settings and data that identifies
users. Includes canvas fonts plugins and other data points that need to be spoofed
Canvas - HTML5 feature that renders graphics. Sites use canvas fingerprinting to
identify users so antidetects must randomize canvas data
WebRTC - Web protocol that can leak real IP address even with VPN. Must be disabled
or properly configured in antidetect browsers
Leaks - Various browser features that can reveal true identity. WebRTC DNS and
other leaks must be patched
Cookies - Small text files stored by browsers that contain login sessions and
preferences. Stealing cookies can bypass 2FA and access accounts without passwords
Escrow - Trusted third party service holds funds until both buyer and seller
complete a transaction. Protects against scams but escrow services can exit scam
too
PGP - Pretty Good Privacy encryption protects messages and files from being read by
others. Essential for secure marketplace communications
Opsec - Operational security includes all practices to stay anonymous and avoid
detection. Includes using secure communications VPNs and proper opsec habits
Burner - Temporary disposable phone number or email used to register accounts.
Should only be used once then discarded
RAT - Remote access trojan malware gives hackers control of infected computers.
Used to steal credentials and data
Vendor - Seller on dark web marketplaces who offers cards dumps or fraud tools.
Reputation and reviews are important
Exit Scam - When a marketplace or vendor suddenly disappears with everyones money.
Always keep minimum balance in markets
BTC - Bitcoin cryptocurrency used for most dark web purchases. Somewhat traceable
so needs to be properly mixed
XMR - Monero cryptocurrency focuses on privacy and untraceability. Preferred over
Bitcoin for maximum anonymity
Pros - Business identities and information packages sold on marketplaces. Contains
EIN numbers business credit profiles and other data needed for business fraud and
applying for loans/credit cards. High credit scores most valuable for loan fraud
Stimmys - Government stimulus payments sent during emergencies like COVID-19.
Targeted using stolen identities to claim multiple payments
CR - Credit reports showing detailed history and scores. Used to verify business
credit profiles and find high-value targets
Scans - High quality scans of ID documents bank statements and utility bills.
Essential for verifying identities and passing KYC
Slips - Checks money orders and deposit slips used for bank fraud. Quality scans
needed for successful deposits (same as original definition posted)
Dump - Raw magnetic stripe data containing card details in track1/track2 format.
Used to create physical cloned cards
PIN - Personal identification number needed for debit card purchases and ATM
withdrawals. Usually 4-6 digits
Balance - Amount of money available to spend on a card. Check balance before
purchasing to avoid declines
Limit - Maximum amount that can be charged to a card. Higher limits are more
valuable but attract more attention
Issuer - Bank that issued the credit card and processes its transactions. Different
issuers have different security measures
3DS - 3D Secure is an authentication protocol that adds an extra security layer for
online card payments. Requires additional verification through bank apps or SMS
codes
MCSC - Mastercard Secure Code protection for online transactions. Similar to VBV
requires additional verification
AMEX Safe - American Express SafeKey verification system for online purchases
Auth - Authorization code proves a transaction was approved. Different auth codes
mean different things.
Decline - Failed transaction due to insufficient funds fraud detection or other
issues. Too many declines burn cards faster
MMN - Mothers maiden name is a common security question for card verification.
Included in quality fullz
SSN - Social security number uniquely identifies US citizens. Critical part of
fullz used for identity verification
Checker - Tool that tests if cards are valid and active. Essential for verifying
card status before use
Auth check - Small test charge to verify card works. Usually $1-2 that gets
refunded
Simple check - Basic card check charge. Higher success rate but can give false
positives
Refund - Methods to get money back from merchants after receiving goods. Social
engineering and fake tracking numbers common tactics
Bank Drop - Bank account opened with fake or stolen identity to receive fraudulent
transfers. Needs proper setup and maintenance to avoid closure
SWIFT - International bank transfer system used to move large amounts between
banks. High value target but heavily monitored
Wire - Bank transfer between accounts usually domestic. Faster than ACH but has
higher fees and scrutiny
ACH - Automated clearing house transfer system for US bank transactions. Takes
several days but less monitored than wires. Essential for large bank fraud schemes
Bank Logs - Stolen online banking credentials with account access. Quality logs
have good balance and minimal security
Zelle - Bank-to-bank transfer service for sending money instantly. Critical tool
for bank fraud due to instant transfers and hard to reverse. Popular but risky due
to verification
Bank Method - Specific technique for successfully getting money from bank accounts.
Methods vary by bank and account type
Bank Login - Credentials to access online banking portals. More valuable with
higher balances and business accounts
EMT - Electronic money transfer system used by banks. Methods exist to bypass
recipient verification and send to any account instantly
Load - Process of sending stolen funds to bank accounts under fraudster control.
Usually done through online banking access for later cashout
CU - Credit union accounts with lower security than major banks. Easier targets for
fraud.
Spam - Mass sending of unsolicited messages for fraud or scams. Used to get bank
logs credit cards accounts and spread malware. Success depends on volume and
avoiding detection
Mailer - Software like AMS (Advanced Mass Sender) used for spam campaigns. Requires
SMTP leads letter templates and proxy support
SMTP - Simple Mail Transfer Protocol server that transmits emails. Private SMTP
servers needed to send mass spam campaigns reliably
Proxy - Server that forwards traffic to hide real IP address. Essential for
avoiding spam detection and blacklists
Leads - Email lists or phone number lists containing potential spam targets.
Quality leads of active emails/active phones improve success rates
Letter - Fake email template that mimics legitimate companies. Edited to trick
victims into clicking phishing links
Blast - Large spam campaign targeting many victims at once. Success needs good
leads templates and sending setup
Warmup - Process of gradually increasing spam volume to avoid detection. New IPs
and domains need proper warmup
Blacklist - List of blocked IPs and domains known for spam. Getting blacklisted
stops spam campaigns
Spamtrap - Fake email address used to detect spammers. Hitting spamtraps gets IPs
blocked fast
Cpanel - Hosting control panel used to host phishing pages. Hacked cpanels needed
since legit hosts block phishing sites
PHP Mailer - PHP script alternative to AMS tools for sending spam. Requires proper
hosting and SMTPsetup
Resold - Cards resold on multiple marketplaces. Have high chance of being dead and
blacklisted due to multiple buyers using them.
Avoid unless price is very low
KYC - Know Your Customer verification required by banks and some sites. Typically
requires ID and selfie etc
Burn - When a method stops working due to patches or detection. All methods
eventually burn so diversify approaches
Clean - Card or method that hasnt been used yet. Clean cards have highest success
rates
Hot - Flagged by fraud detection systems for suspicious activity
Dead - Card or method that no longer works at all
SE - Social engineering manipulates people into giving up sensitive information or
access or allowing certain things to happen. Uses psychology and deception rather
than technical hacks
Fresh - New unused cards or methods with no fraud history. Best chances of success
with fresh stuff
Cashout - Process of converting stolen funds into clean cash. Many methods like
purchases gift cards and bitcoin
Linkable - Cards that can be easily added to digital payment apps like Cashapp
Apple Pay or Google Pay. Often sold at premium but high risk of being fake or
already linked. Many rippers pretend to sell linkables. Rippers Typically Sell
linkables.
Reship - Service that forwards packages to final destination. Adds layer of
protection for carded goods
Receiver - Person who receives and forwards money for commission. Takes on risk of
detection
Phishing - Creating fake websites to steal login credentials and card details.
Common way to get fresh cards
Scamshops - Online storefronts designed to steal credit card details. Spread
through ads and fake deals. Look legitimate but only exist to collect card data
Botnet - Network of compromised computers controlled remotely. Used for getting
logs and DDoS attacks
Loader - Person who
specializes in sending fraudulent transfers and payment links to cash out
cards/bank accounts.
Ripper Terms:
Flash Transactions/Crypto Flashing - Fake blockchain exploit that claims to
multiply cryptocurrency transactions. Scam method sold by rippers that doesnt
actually work on any blockchain network. Common ripoff targeting new users
EMV Clone - Methods that claim to enable EMV chip cloning for specific banks/BINs.
Outdated scam that dont work in modern EMV systems. Commonly sold by rippers
despite being useless
WU Transfers - Western Union transfer scam where rippers claim to have exploits in
WUs system. They ask for payment upfront promising to send larger amounts back
through Western Union. Classic decades-old scam that never works but still commonly
used to target new users