choose ssh or socks to work with logs?

dragon8488

Carder
Messages
31
Reaction score
7
Points
8
Hi guys.
1. Should i use ssh or socks to work with logs.
2. What are the pros and cons of each type?
3. if working with socks is there enough time? because socks 5 don't live as long as ssh.
4 . and if working with ssh where should i buy it.
@Teacher
 
Please note, if you want to make a deal with this user, that it is blocked.
Hi guys.
1. Should i use ssh or socks to work with logs.
2. What are the pros and cons of each type?
3. if working with socks is there enough time? because socks 5 don't live as long as ssh.
4 . and if working with ssh where should i buy it.
@Teacher
Use socks, socks can last forever, simply add it to favorite. Use lux socks or luminati socks (brightdata.com).
 
Hello.
1. Should i use ssh or socks to work with logs.
Logs are a very sensitive topic. It is necessary to select an IP address that fully matches the cardholder.
Yes, you can use ssh tunnel or socks5 proxy to successfully work with logs.
But the best thing for these purposes is to use a home RDP (dedicated server).

2. What are the pros and cons of each type?
Pros:
+ Large selection for the desired correspondence of the cardholder address
+ Cheap cost
+ Fast and convenient connection setup

Cons:
- SSH tunnels and socks are usually very slow in speed.
- SSH tunnels and socks do not last long. And the duration of the work is extremely short.
- SSH tunnel and socks can be blacklisted or spam databases. It is necessary to check them before use for leaks and being in black bases.
- SSH tunnels and socks can be located far from the cardholder. Even if you take a proxy in one city of the cardholder, this may not be enough, since the antifraud system will reject them due to the remote location of the IP.
- Antifraud systems can detect the standard port on which they work. You need to hide it.

3. if working with socks is there enough time? because socks5 don't live as long as ssh.
Socks5 proxies do not live very long and a diskette (interruption / loss of connection) can occur at the most crucial moment.
At the next attempt, you need to select the closest socks5 by mask in the proxy service.
SSH tunnels live a little longer, but it can also be a nuisance with a broken connection.
In this case, everything depends on the antifraud system and how it will react to it.

4 . and if working with ssh where should i buy it.
upswift.io
buy.fineproxy.org/ssh-tunnel-proksi.html
acloudguru.com
sshseller.tk
rdpdedic.ru
rdpsocks.deer.io
shopse.deer.io
getssh.net
Jabber: amigo_trade@xmpp.jp
jabber: sshtunnels@exploit.im
Jabber: Cleanrdps@exploit.im
Jabber: rdpseller@exploit.im
Jabber: almaz_00@xmpp.jp
Jabber: amigotrade@exploit.im
Jabber: smtpsrvs@crypt.am
Jabber: rudyy.ru@jabber.ua
ICQ: 287103183
ICQ: 714154268
ICQ: 585227
ICQ: 660055743
ICQ: 680311913
Telegram @amigo_trade
Telegram @Cleanrdps
Telegram: @sellerssh
 
Hello.

Logs are a very sensitive topic. It is necessary to select an IP address that fully matches the cardholder.
Yes, you can use ssh tunnel or socks5 proxy to successfully work with logs.
But the best thing for these purposes is to use a home RDP (dedicated server).


Pros:
+ Large selection for the desired correspondence of the cardholder address
+ Cheap cost
+ Fast and convenient connection setup

Cons:
- SSH tunnels and socks are usually very slow in speed.
- SSH tunnels and socks do not last long. And the duration of the work is extremely short.
- SSH tunnel and socks can be blacklisted or spam databases. It is necessary to check them before use for leaks and being in black bases.
- SSH tunnels and socks can be located far from the cardholder. Even if you take a proxy in one city of the cardholder, this may not be enough, since the antifraud system will reject them due to the remote location of the IP.
- Antifraud systems can detect the standard port on which they work. You need to hide it.


Socks5 proxies do not live very long and a diskette (interruption / loss of connection) can occur at the most crucial moment.
At the next attempt, you need to select the closest socks5 by mask in the proxy service.
SSH tunnels live a little longer, but it can also be a nuisance with a broken connection.
In this case, everything depends on the antifraud system and how it will react to it.


upswift.io
buy.fineproxy.org/ssh-tunnel-proksi.html
acloudguru.com
sshseller.tk
rdpdedic.ru
rdpsocks.deer.io
shopse.deer.io
getssh.net
Jabber: amigo_trade@xmpp.jp
jabber: sshtunnels@exploit.im
Jabber: Cleanrdps@exploit.im
Jabber: rdpseller@exploit.im
Jabber: almaz_00@xmpp.jp
Jabber: amigotrade@exploit.im
Jabber: smtpsrvs@crypt.am
Jabber: rudyy.ru@jabber.ua
ICQ: 287103183
ICQ: 714154268
ICQ: 585227
ICQ: 660055743
ICQ: 680311913
Telegram @amigo_trade
Telegram @Cleanrdps
Telegram: @sellerssh
a very specific answer, thank you very much!
Does the AF system detect when I work with a RDP?
 
In carding, it is very important to set an IP address that will be close to the address of the cardholder.
RDP, VPN, proxy socks5, ssh tunnels will help to do this and they will be very useful.
Everything will depend on the anti-fraud system of the store or service in which you plan to work.
In many stores, anti-fraud is not installed at all or has soft settings, so even if the ports are detected, the store can approve the payment and you will succeed.
It all depends on the site with which you will work and its attitude towards payment from a suspicious device.
 
Top