Transaction Tracing in Carding: Combining Chainalysis, MaxMind, and Incode to Deanonymize Monero

Student

Professional
Messages
271
Reaction score
156
Points
43

A Comprehensive Educational Overview: Tracing in the Context of Carding​

Introduction and Educational Context: This material is intended solely for educational purposes: understanding the mechanisms of financial cybersecurity, compliance, and investigations in the cryptocurrency space. Carding is a type of cybercrime that involves the theft and fraudulent use of bank card data (number, CVV, expiration date) to purchase goods, services, or convert to cryptocurrency. In 2025, carding is often combined with private cryptoassets like Monero (XMR) for cashing out to avoid tracking. However, such schemes are vulnerable to tracing through specialized tools such as Chainalysis (blockchain analysis), MaxMind (IP geolocation), and Incode (KYC verification). We will analyze how these tools work on the blockchain, drawing on public reports (e.g., Chainalysis Crypto Crime Report 2025, Gartner Magic Quadrant for Identity Verification 2025). This will help us understand why 85% of crypto carding schemes are detected within the first 72 hours (data from Chainalysis).

What is carding and Monero's role in it? Carding is an organized activity where attackers:
  1. They steal card data (through phishing, skimmers or darknet forums).
  2. They buy goods/services worth $100–$10k and then resell them (dropshipping or eBay).
  3. Cash out via crypto: Convert to BTC/XMR on P2P platforms or CEX (centralized exchanges) using mixers for disguise.

Monero is popular in carding due to its privacy: ring signatures mix transactions, stealth addresses obscure the recipient, and RingCT (confidential transactions) hides the amount. According to Chainalysis 2025, 22% of crypto fraud (including carding) uses Monero—a 15% increase since 2024. However, tracing efficiency reaches 80% when using external data (IP, KYC).

1. Chainalysis: Blockchain Analysis and Tracing of Monero in Carding (80% Efficiency)​

Chainalysis is an AI platform for forensic blockchain analysis used by the FBI, Europol, and exchanges (Binance, Coinbase). It processes 10+ blockchains, including Monero, and generates a "Reactor"—a visual transaction map with address attribution (linked to real-world entities).

How it works in carding:
  • On-ramps: The carder buys XMR on an exchange (e.g., Kraken) with stolen funds. Chainalysis performs KYT (Know Your Transaction) scans in real time: if a transaction is flagged as "high-risk" (source mismatch), it is flagged. By 2025, 65% of carded transactions are detected here.
  • Mixing and chaining: Monero mixes tx in rings (size 11-16, by default), but Chainalysis uses:
    • Heuristic Analysis: Time/amount correlation with public data (e.g. if $5k XMR is bought immediately after buying an iPhone with a stolen card).
    • Mining pools: Three pools (SupportXMR, MineXMR, and Nanopool) mine 82% of XMR. Chainalysis tracks "coinbase transactions" (miner rewards) and links them to subsequent transactions—70% of chains are traceable.
    • Network attacks: Malicious nodes collect metadata (timestamp, IP). In 2024, Chainalysis demonstrated tracing of 77% of XMR-tx since 2021 (leaked video). For carding: If the carder uses a remote wallet (not a local node), the IP correlates with the tx – the chance of deanonymization is 80%.

Efficiency in numbers (Chainalysis 2025):

Tracing typeEfficiencyExample in carding
Through exchanges90%Buy XMR with fiat using a flag card
Through pools75%The connection between mining and dropshipping
Metadata (IP)80%Correlation with MaxMind for geo

Educational insight: Carders try to get around this by "churning" (repeated mixing), but AI Chainalysis (with ML models) predicts patterns with 85% accuracy.

2. MaxMind: IP Geolocation and Carding Connection​

MaxMind is a provider of GeoIP2 databases, updated weekly. Coverage: 250+ million IP addresses, 99.9999% accuracy for countries, 85–95% accuracy for cities (error radius 10–50 km in cities, 100+ km in rural areas). Used in fraud detection (Stripe, PayPal).

Role in carding tracing:
  • IP collection: Chainalysis extracts IP from Monero nodes or exchange logs (for example, when withdrawing XMR to a wallet). Carders often use VPN/Tor, but:
    • Anycast and leaks: 30% of VPNs leak their real IP (WebRTC, DNS). MaxMind attributes them by ASN (autonomous system, e.g., ExpressVPN — AS13335).
    • Correlation with TX: If a TX for $2,000 XMR coincides in time with an IP address from Kyiv, MaxMind adds the following: country (UA), city (Kyiv), ISP (Kyivstar), and type (mobile). In carding, this narrows it down to the "dropship address" (where the item was delivered).
  • Chainalysis integration: MaxMind's API in Reactor shows "geo-clusters"—groups of TX from the same region — flagging "carding farms" (organized groups in Russia/Ukraine/India, 40% of global carding according to Interpol 2025).

Efficiency:
  • Without VPN: 95% accuracy.
  • With VPN: 60–70% (via side-channel attacks). Educational insight: In carding, IP tracing reveals "full" (the victim's full data), helping banks (Visa/Mastercard) block 92% of fraud at the authorization stage.

3. Incode: KYC verification and deanonymization in carding​

Incode is a cloud-based digital identity platform and a Gartner 2025 Leader. It processes 5 billion checks annually and focuses on AI biometrics (99.7% accuracy against spoofing). Integrates with 2,000+ services (Okta, Salesforce).

The process in the context of carding:
  • eKYC on exit: The carder withdraws XMR in fiat to CEX (e.g., Binance). Incode requires:
    • Documents: Passport/ID scan, OCR recognition (name, photo, address).
    • Biometrics: Selfie with liveness (eye/head movement) detects deepfakes 98% of the time.
    • Risk scoring: Checks for sanctions (OFAC), PEP (politically exposed persons), and AML. If the IP address from MaxMind does not match the address in the ID (e.g., an IP in Moscow, an ID from New York), a "high risk" flag is raised.
  • Connection with Chainalysis: The Incode API passes KYC data to Reactor, attributing the XMR address to the user's full name. In carding, 55% of schemes fail here when a "mule" (middleman) with a fake ID leaks the chain.

Efficiency:

KYC componentAccuracyRole in carding
Documents98%Identifying fake fullz
Biometrics99.7%Against photo replacements
Risk92%IP/Chainalysis Mismatch Flags

Educational insight: Incode reduces fraud by 40% for exchanges; predictive KYC with ML for proactive blocking introduced in 2025.

Complete Carding Tracing Chain: Step-by-Step Scenario​

Imagine a typical scheme: Carder steals a card, buys $3k in gift cards, sells for XMR, withdraws to fiat.

StepCarder actionTracingToolChance of success (%)
1. Theft/purchaseAmazon purchaseBank flags chargebackChainalysis (KYT)65
2. ConversionXMR to P2P (LocalMonero)Chain Analysis Across PoolsChainalysis80
3. MovingMixing + outputIP log from the nodeMaxMind (geo)75
4. Cashing outListing on the exchangeKYC verificationIncode90
ResultArrest/freezingFull attributionAll85 (total)

Case Study (anonymized, Chainalysis 2025): A group of carders in Eastern Europe processed $2 million via Monero. Tracing: Chainalysis → 82% tx via pools; MaxMind → IP in Minsk; Incode → KYC revealed 12 names. $1.8 million frozen.

Tracing limitations and compliance lessons
  • Monero weaknesses: Only 20% of tx are fully private (local nodes + no KYC).
  • Bypass: DEX (decentralized exchanges), I2P/Tor, but 70% of carders are caught by "human error" (reuse of addresses).
  • Trends 2025: EU's MiCA requires KYC for all crypto-transactions >€1k; Chainalysis + AI = 95% detection for organized crime.

This review emphasizes: privacy is not absolute, and compliance is key to security. For more in-depth information, I recommend Chainalysis reports or the blockchain forensics course on Coursera. If you need any clarification (e.g., simulation code), let me know!
 
Top