Back to Blog
Billing

How to Stop Card Testing Attacks on Your Checkout (2026 Guide)

Card testing attacks cost businesses millions in chargebacks and fees. Learn the 7 essential protection methods to stop fraudsters from testing stolen credit cards on your checkout.

January 13, 202614 min read
P
PayRequest Team
Product

Card testing attacks are one of the most damaging forms of checkout fraud facing online businesses today. Fraudsters use automated bots to test thousands of stolen credit card numbers on your checkout, causing chargebacks, processing fees, and potentially getting your merchant account suspended.

This comprehensive guide explains exactly what card testing is, why it's so dangerous for your business, and the proven strategies to stop it before it costs you money.

What Is a Card Testing Attack?

A card testing attack occurs when fraudsters use your online checkout to verify whether stolen credit card numbers are valid. They typically run small transactions—often under €1—to test which cards work before using them for larger fraudulent purchases elsewhere.

Here's how a typical attack unfolds:

Step 1: Obtain Stolen Card Data Fraudsters acquire large batches of credit card numbers through data breaches, phishing scams, or dark web purchases. These lists often contain thousands of card numbers with varying amounts of information—some include CVV codes and billing addresses, others just the card number.

Step 2: Target Vulnerable Checkouts Attackers look for checkouts without fraud protection. Sites without CAPTCHA, rate limiting, or address verification become easy targets. Payment pages that accept small amounts or don't require full billing details are particularly attractive.

Step 3: Automate the Testing Using automated scripts and bots, fraudsters attempt transactions at high speed—sometimes hundreds per minute. Each successful transaction confirms a valid card number. Failed transactions help them eliminate invalid cards.

Step 4: Use Valid Cards Elsewhere Once cards are validated, they're either used for larger fraudulent purchases or sold to other criminals at premium prices. A verified stolen card is worth significantly more on the black market than an untested one.

Why Card Testing Devastates Businesses

The damage from card testing extends far beyond the immediate fraudulent transactions. Understanding these consequences helps explain why prevention is so critical.

Processing Fee Accumulation

Every transaction attempt—even failed ones—may incur processing fees depending on your payment provider. When bots attempt thousands of transactions, these small fees compound into significant losses. Some businesses report paying hundreds in fees during a single attack.

Chargeback Costs

Any successful test transactions will eventually result in chargebacks when legitimate cardholders notice the charges. Each chargeback typically costs €15-25 in fees, plus the transaction amount, plus potential penalty fees for high chargeback ratios.

Merchant Account Risk

Payment processors monitor chargeback ratios closely. Under Visa's VAMP guidelines effective October 2025, merchants with excessive fraud attempts face penalties. High fraud ratios can result in increased processing fees, reserve requirements, or complete account termination.

Operational Disruption

Card testing attacks flood your order system with fake transactions. Your team wastes time investigating suspicious orders, your analytics become polluted with false data, and legitimate customer orders can get delayed or caught in fraud filters.

The 7 Essential Protection Methods

Stopping card testing requires a multi-layered approach. No single technique works perfectly alone, but combining several methods creates formidable defense.

1. Implement Invisible CAPTCHA

Modern CAPTCHA solutions like Cloudflare Turnstile run silently in the background, distinguishing humans from bots without showing puzzles or image challenges. This stops automated scripts while creating zero friction for legitimate customers.

Unlike traditional CAPTCHAs that frustrate users, invisible CAPTCHA analyzes browser behavior, mouse movements, and other signals to detect automation. Bots fail these checks automatically.

2. Enable Rate Limiting

Rate limiting restricts how many transactions can originate from a single IP address or email within a time window. Legitimate customers rarely attempt more than a few purchases per hour, but bots need to test cards rapidly to be effective.

Recommended settings:

  • Maximum 10 checkout attempts per IP per hour
  • Maximum 5 attempts per email per hour
  • 30-minute cooldown after hitting limits
3. Require CVV Verification

Most stolen card data doesn't include CVV codes—the 3-digit security number on the back of cards. Requiring CVV verification blocks transactions where fraudsters only have the card number.

Configure your payment processor to decline all transactions with missing or incorrect CVV responses. This simple setting blocks a large percentage of card testing attempts.

4. Use Address Verification System (AVS)

AVS compares the billing address entered during checkout against the address on file with the card issuer. Fraudsters testing cards often don't have accurate billing information.

Set your processor to decline transactions where the street address doesn't match. While this may occasionally block legitimate customers who moved recently, it provides strong protection against fraud.

5. Add Honeypot Fields

Honeypot fields are invisible form inputs that real users never see or fill out. Bots, following their scripts, often complete every field—including hidden ones. When a honeypot field contains data, the transaction is automatically blocked.

This technique catches automated scripts without affecting legitimate users at all.

6. Block Suspicious Countries

If your business doesn't serve certain geographic regions, blocking checkout attempts from those areas eliminates a significant fraud vector. Many card testing operations originate from specific countries.

Rather than blanket country blocking, analyze your legitimate customer geography and create targeted restrictions. If you've never had a real customer from a particular region, there's little downside to blocking it.

7. Implement Velocity Filtering

Velocity filters detect patterns that indicate testing behavior: multiple failed attempts with different card numbers, sequential card numbers being tested, or rapid-fire transactions. These patterns are unmistakably bot behavior.

Configure your fraud prevention to flag or block orders matching these velocity patterns.

How PayRequest Protects Your Checkout

PayRequest includes built-in checkout fraud protection that implements all these techniques automatically. When you enable spam protection in your settings, you get:

Multi-Layer Detection: Cloudflare Turnstile CAPTCHA, honeypot fields, name analysis, and rate limiting work together to stop bots before they reach your payment processor.

Sensitivity Controls: Choose between Low, Medium, and Strict protection levels based on your risk tolerance. Most businesses find Medium provides optimal balance.

Country Blocking: Block orders from specific countries with a friendly message for legitimate customers who may need assistance.

Whitelist Management: Ensure trusted customers and partners always get through by whitelisting their email addresses or domains.

Real-Time Monitoring: View every blocked attempt with details about why it was stopped. See risk scores, IP addresses, and block reasons at a glance.

Quick Recovery: If a legitimate customer gets blocked accidentally, unblock their IP with one click directly from your dashboard.

Responding to an Active Attack

If you're currently experiencing a card testing attack, here's your immediate action plan:

Step 1: Enable All Protection Turn on maximum fraud protection immediately. Accept that you may temporarily block some legitimate customers—stopping the attack is the priority.

Step 2: Block Identified IPs Review your blocked attempts log and add persistent attackers to your permanent blocklist.

Step 3: Contact Your Payment Processor Notify your payment processor about the attack. They may be able to provide additional protection at the gateway level and will understand if your fraud metrics spike temporarily.

Step 4: Review Completed Orders Audit any orders that did complete during the attack period. Cancel suspicious transactions before they ship to reduce chargeback exposure.

Step 5: Strengthen Verification After the attack subsides, consider requiring stronger verification—like email confirmation—for high-risk order profiles.

Preventing Future Attacks

Card testing prevention isn't a one-time fix. Maintain strong protection through these ongoing practices:

  • Keep fraud protection enabled at all times, not just during attacks
  • Monitor your blocked attempts dashboard weekly for patterns
  • Review and adjust sensitivity settings based on your false positive rate
  • Stay informed about new fraud techniques and attack patterns
  • Maintain relationships with your payment processor for quick escalation

The cost of prevention is always less than the cost of an attack. A few blocked legitimate customers is far preferable to thousands in chargeback fees and a suspended merchant account.

Get Protected Today

Don't wait for an attack to take checkout security seriously. PayRequest's fraud protection takes one click to enable and immediately shields your business from card testing, bot attacks, and fake orders.

With 0% platform fees and protection included at every plan level, there's no reason to leave your checkout vulnerable. Start your free trial and see how easy proper fraud prevention can be.

Frequently Asked Questions

What is a card testing attack?

A card testing attack occurs when fraudsters use automated bots to test stolen credit card numbers on your checkout. They make small transactions to verify which cards are valid before using them for larger fraudulent purchases elsewhere.

How do I know if my checkout is being card tested?

Signs include sudden spikes in failed transactions, multiple small-amount orders in quick succession, orders with gibberish names or emails, and unusually high checkout attempts from single IP addresses.

What is the best way to prevent card testing?

Use multiple protection layers: invisible CAPTCHA, rate limiting, CVV verification, address verification (AVS), honeypot fields, and velocity filtering. No single method works perfectly alone.

Will fraud protection block legitimate customers?

Good fraud protection minimizes false positives. With proper sensitivity settings, legitimate customers rarely get blocked. If they do, you can whitelist their email or unblock their IP instantly.

How quickly can card testing damage my business?

Damage can occur within hours. High chargeback ratios can get your merchant account flagged within weeks. Visa's VAMP guidelines penalize merchants with over 300,000 monthly enumeration attempts.

Does PayRequest include card testing protection?

Yes. PayRequest includes multi-layer checkout fraud protection with CAPTCHA, rate limiting, honeypot fields, country blocking, and real-time monitoring—all at no extra cost.

Share this article

Ready to get started?

Join thousands of businesses using PayRequest to get paid faster.

Get Started