The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Unfortunately, with that opportunity come people who want to make money in less than honest ways. We're going to look at some concrete ways you can identify fraudulent transactions and save yourself a lot of chargeback fees, money and grief.
Get more information from prospective customers.
The more information you have to work with, the better your chances are that you will be able to positively identify fraudulent transactions. At the very least, you need to make sure you get a customer's name, credit card billing address, phone number and the IP address of the computer currently accessing the order form. You should also get a valid email address. This email address should not be one that comes from a free email service.
Fraudulent transactions occur more frequently from certain countries.
The first thing you should know is that certain countries are more prone to fraudulent transactions than others. If you get an order originating from one of the following countries, you should be suspicious and do more digging. Some of these countries include: Ukraine, Indonesia, Yugoslavia, Lithuania, Egypt, Romania, Bulgaria, Turkey, Morocco, Vietnam, Russia, Pakistan, Malaysia, Nigeria, Israel, Iran, Cameroon, Gambia, and Ghana. This doesn't mean that every transaction from any of these countries is definitely fraudulent. But you should be very suspicious.
Confirm the address of the customer.
The first thing I do when I get an online order is to check the phone number of the customer against a reverse phone number directory. The majority of my orders come from the United States and Canada. Phone numbers from these countries can usually be entered into reverse directories to find out the address that phone number belongs to. If I can't get a match for the phone number it servers as a red flag and warrants more investigation.
Lookup the customer's country and city of origin
I've already outlined a long list of countries that should be suspicous to you. How do you determine if your customer placed the order from within one of these banned countries? Simple. You cross reference their IP address with an IP lookup database that can tell you what country they are in. The city they are from and sometimes even ISP they use! If you handle only a few orders a day, you can use an excellent free service at IP2Location.com. If you do handle more volume, IP2Location.com also offers subscription packages at various prices.
Once you determine the country of origin, if it doesn't match the country the customer listed with their billing information be very careful. Yes, it is possible that your customer could be travelling away from home. It is much more likely that their credit card information has been stolen and it is being used fraudulently. A mismatch between the country reported by IP and the billing address is a big red flag.
Don't let customers use free email addresses.
A free email address is so easy to setup at most free email services. The odds of your being able to track down the person that registered that free email address are next to none. If at all possible, block all known free email services. The most common include Hotmail, Yahoo, Mail.com, and Gmail. If you can't block free email addresses in advance, consider a free email address a red flag. A utility you can use to determine if an email address is a known free email is dnsstuff.com. Look towards the bottom left of the page that comes up.
Don't ship a product until you are sure.
If two or more red flags go up, beware. If you ship a product from a fraudulent transaction, you will very likely be slapped with a chargeback from your credit card company and lose the money from the good. Be skeptical of all orders until everything checks out to your satisfaction. If in doubt, refund the purchase. Too many chargebacks will result in the cancellation of your merchant account. Who needs that?
A little diligence can go a long way to helping you prevent loses from fraudulent transactions. With a little knowledge, you can greatly reduce lost profits due to fraud.
This article was written by Joe Duchesne, president of http://www.yowling.com/, Yowling offers free ecommerce shopping carts with their web hosting plans. Copyright 2005 Yowling. Reprint Freely as long as you provide a clickable link back to my website from this resource box.
![]() |
|
![]() |
|
![]() |
|
![]() |
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
This is not some new fangled techno-speak, it is a... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
As the number of people using the Internet as an... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
There are ways to insure security though. You can get... Read More
You've seen it in the news - 40 million credit... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Be careful of sites that promise to send you "instant... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Paypal is a great site and is used by many... Read More
With the advent of the World Wide Web, a whole... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Someone recently told me, "You would have to be a... Read More
When we think of adware, what comes to mind are... Read More
A friend called me one day and asked if I... Read More
Spyware is software that runs on a personal computer without... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
If you use emails actively in your communication, you must... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
No longer are viruses the only threat on the internet.... Read More
They're out there. Individuals trying to make a quick buck... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
I am the victim of an internet scam. It is... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
So called phishers try to catch the information about the... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The 1998 Data Protection Act was not an extension to,... Read More
There are folks out there who use their powers for... Read More
Today the internet is a mine field of malicious code... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
You and I are a lot alike. We are both... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Spyware is the most troublesome software to appear on the... Read More
Threats we ordinary Web users face online leave us no... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
The first thing people think about when defending their computers... Read More
With the Internet entering our lives in such an explosive... Read More
A new variation of the Nigerian Scam theme ... Read More
By browsing a web page, you could infect your computer... Read More
Millions of people make purchases online, but many people are... Read More
A couple of days ago, I was searching for a... Read More
In recent days, I was one of the unfortunate persons... Read More
Watching how the traditional media covers the latest virus or... Read More
If you use emails actively in your communication, you must... Read More
With the advent of the World Wide Web, a whole... Read More
You may not realize it, but as you are surfing... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
There is no doubt that "how-to articles" have become a... Read More
If you are wondering how to fight spyware for safe... Read More
When the Internet first came about, it was realized it... Read More
Phishing is the act of some individual sending an email... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Imagine my surprise when I received a phone call from... Read More
Fishing on the Internet has come a long way. However,... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Internet Security |