How to Create an Amazon Stealth Account
Amazon generated $638 billion in net sales in 2024 with 9.7 million sellers globally. Tens of thousands of seller accounts are suspended every year — many for legitimate business disputes, policy misunderstandings, or competitor manipulation. For sellers who have lost their primary account, a stealth account is often the only path back to the platform.
This guide covers every technical layer of Amazon's detection system and the specific countermeasures for each: antidetect browsers, mobile proxies with CGNAT, identity separation, payment isolation, and account warming. Based on real detection data and seller experiences as of 2026.
What This Guide Covers
What Is an Amazon Stealth Account?
A stealth account is a secondary Amazon seller account created with a completely separate identity, payment method, device fingerprint, and IP address — designed to be technically unlinked from any previous Amazon account. Sellers create stealth accounts when their primary account has been suspended or permanently banned, and they need to continue operating on Amazon's marketplace.
Amazon's Terms of Service explicitly prohibit operating multiple seller accounts unless you have a "legitimate business need" and receive Amazon's written approval. In practice, Amazon rarely grants this approval. Sellers whose accounts are suspended for issues like late shipments, policy disputes, or competitor-initiated complaints often have no realistic path back through Amazon's official appeal process — the Plan of Action (POA) reinstatement success rate for serious suspensions is estimated at 15-30%.
The core challenge is that Amazon's detection system is among the most sophisticated in e-commerce. Amazon uses ML-based "human likelihood scores" — similar to the fraud detection models used by major banks — that combine dozens of data points into a single confidence score. Each data point alone might not trigger a flag, but the composite score across browser fingerprint, IP address, device ID, payment method, contact information, and behavioral patterns creates a near-unique identifier for each seller.
Amazon Seller Platform: Key Numbers (2024-2026)
How Amazon Detects Linked Accounts
Amazon cross-references 8 primary detection vectors across all seller accounts in all marketplaces globally. Understanding each vector is essential before creating a stealth account — a single weak link in any vector can expose the connection.
Browser Fingerprint
What Amazon Tracks
Canvas fingerprint, WebGL renderer hash, installed fonts list, screen resolution, color depth, timezone, language settings, platform string, navigator plugins, AudioContext fingerprint
How It's Detected
Amazon collects a composite browser fingerprint on every page load. The fingerprint is hashed and stored server-side. If the same fingerprint appears across two seller accounts, both are flagged for manual review within 24-48 hours.
Mitigation
Use an antidetect browser (Multilogin, GoLogin, AdsPower) that generates unique Canvas, WebGL, and AudioContext fingerprints per profile. Never use a regular browser with multiple accounts.
IP Address & Network
What Amazon Tracks
IPv4/IPv6 address, ASN (Autonomous System Number), ISP name, geolocation (city-level), connection type (residential/datacenter/mobile), WebRTC leak detection, DNS leak detection
How It's Detected
Amazon maintains a database of known datacenter and VPN IP ranges. Datacenter IPs are automatically flagged. Two seller accounts from the same residential IP within 90 days triggers an investigation. WebRTC leaks expose the real IP even behind a proxy.
Mitigation
Use 4G/5G mobile proxies with CGNAT — carrier IPs are shared by thousands of real users, making them indistinguishable from legitimate mobile traffic. Disable WebRTC in your antidetect browser profile.
Device & Hardware IDs
What Amazon Tracks
MAC address (via desktop app), device serial number, hardware identifiers from Amazon app, screen dimensions, GPU model, CPU core count, available memory
How It's Detected
The Amazon Seller Central desktop app and mobile app collect hardware-level identifiers. These persist across browser clears, VPN changes, and even OS reinstalls. Two accounts with the same hardware ID = instant suspension.
Mitigation
Never install the Amazon desktop app on a shared machine. Use separate antidetect browser profiles with unique hardware spoofing. For mobile, use separate physical devices or properly isolated Android emulators.
Cookies & Local Storage
What Amazon Tracks
First-party cookies (session-id, ubid-main, x-main), localStorage keys, IndexedDB entries, cached authentication tokens, cross-domain tracking pixels
How It's Detected
Amazon plants persistent tracking cookies that survive standard browser clears. The ubid-main cookie is particularly sticky — it persists across sessions and is used to build a browsing history profile. If the same cookie appears on two seller accounts, they are linked.
Mitigation
Antidetect browsers isolate cookies per profile by default. Never copy profiles or share browser data between accounts. Clear all storage before creating a new profile — or better, start from a fresh profile every time.
Payment Method
What Amazon Tracks
Credit/debit card number, bank account (routing + account number), billing address, cardholder name, card BIN (first 6 digits), payment processor metadata
How It's Detected
Amazon cross-references payment methods across all seller accounts in all marketplaces (US, UK, DE, JP, etc.). Same card on two accounts = immediate link. Even same BIN range + same billing zip code raises flags.
Mitigation
Use a completely separate payment method for each stealth account. Virtual credit cards (VCCs) from providers like FlexCard provide unique card numbers with unique BINs. Never reuse billing addresses.
Email & Phone
What Amazon Tracks
Email address, email domain, phone number, SMS verification patterns, email creation date, email provider reputation
How It's Detected
Amazon checks if the email was recently created (new Gmail addresses are suspicious), whether the phone number has been used on other Amazon accounts, and whether the email domain is associated with disposable email services. Phone numbers are particularly dangerous — Amazon can detect VoIP numbers vs. real carrier numbers.
Mitigation
Use an aged email address (3+ months old) from a reputable provider. Get a real prepaid SIM card for the phone number — not a VoIP number. Amazon can detect Google Voice, TextNow, and similar virtual phone services.
Shipping & Business Address
What Amazon Tracks
Return address, ship-from address, business address on seller profile, address normalization (USPS format), proximity to other seller addresses
How It's Detected
Amazon normalizes all addresses to a standard format and compares them. Same building, same street, even same zip code with similar business names can trigger a review. FBA sellers are partially shielded since Amazon handles fulfillment, but the return address still matters.
Mitigation
Use a completely different physical address. PO boxes work for some fields. If using FBA (Fulfilled by Amazon), the ship-from address is Amazon warehouse, reducing this vector — but your business address on the seller profile must still be unique.
Product & Behavioral Patterns
What Amazon Tracks
Product categories, listing templates, product photography style, supplier data (from invoices), pricing patterns, listing creation velocity, keyword usage patterns, brand registry data
How It's Detected
Amazon uses ML models to detect behavioral similarities between accounts. If two accounts sell the same niche products, use similar listing templates, source from the same suppliers (detected via invoices submitted for ungating), and follow the same pricing patterns, they are flagged for review even without any technical linkage.
Mitigation
Diversify product categories between accounts. Use different listing templates, different product photography styles, different suppliers. Do not copy-paste listing content between accounts. Stagger listing creation — do not bulk-list 50 products on day one.
Antidetect Browser Setup for Amazon
An antidetect browser is the foundation of any stealth account operation. It generates a unique browser fingerprint for each profile, preventing Amazon from linking accounts through Canvas, WebGL, AudioContext, or font fingerprinting.
Multilogin
Profiles
100-1,000
Browser Engines
Mimic (Chromium) + Stealthfox (Firefox)
Fingerprinting
Canvas, WebGL, AudioContext, fonts, geolocation, timezone — all spoofed per profile. Uses real browser engines, not emulation.
Amazon Fit
Best for serious operations. Real browser engines pass Amazon fingerprint checks at the highest rate. Canvas and WebGL spoofing is hardware-level, not JavaScript injection.
Team Features
Profile sharing, team access controls, cloud profile storage, API for automation
Cons: Most expensive option. Overkill for 1-2 accounts.
GoLogin
Profiles
100-2,000
Browser Engines
Orbita (Chromium-based)
Fingerprinting
Canvas, WebGL, AudioContext, fonts, screen, timezone. Uses noise injection rather than hardware-level spoofing. Effective for most platforms.
Amazon Fit
Excellent value for small to medium operations (1-10 accounts). Fingerprint spoofing passes Amazon checks reliably. Cloud-based profiles accessible from any machine.
Team Features
Cloud profiles, team sharing, Android app for mobile management, built-in proxy manager
Cons: Single browser engine (Chromium only). Noise injection is technically less robust than Multilogin hardware spoofing.
AdsPower
Profiles
2-500 (free tier: 2)
Browser Engines
Sun Browser (Chromium) + Flower Browser (Firefox)
Fingerprinting
Canvas, WebGL, AudioContext, fonts, hardware. Offers both Chromium and Firefox engines. RPA automation built-in.
Amazon Fit
Best free tier in the market (2 profiles free forever). Good for testing or single stealth account. Built-in automation (RPA) useful for account warming routines.
Team Features
RPA automation, local API, team collaboration, Facebook-specific features, e-commerce templates
Cons: Free tier limited to 2 profiles. UI less polished than Multilogin. Some advanced fingerprint parameters not as granular.
Antidetect Browser Configuration Checklist for Amazon
Mobile App Strategy: BlueStacks & Android Emulators
Using the Amazon Seller app on an Android emulator like BlueStacks provides a different device fingerprint than any browser-based approach. The Amazon mobile app collects different telemetry than the web version — Android device ID, build model, IMEI (if exposed), and app-level tracking data. When properly isolated, an emulator can serve as an effective alternative to antidetect browsers.
However, Amazon can detect standard emulators through build properties (e.g., "google_sdk" device model), missing telephony features, and accelerometer/gyroscope inconsistencies. For better results: change the device model to a real phone (e.g., Samsung Galaxy S24), spoof the Android ID and build fingerprint, enable GPS spoofing set to your proxy location, and route all traffic through a mobile proxy within the emulator.
Mobile Proxy Configuration for Amazon
Why 4G/5G mobile proxies are the only reliable proxy type for Amazon seller accounts — and how CGNAT makes mobile IPs inherently trusted.
Why Mobile Proxies Pass Amazon's Trust Checks
CGNAT Shared IP Pool
Carrier-Grade NAT (CGNAT) means each mobile IP address is simultaneously shared by 50-1,000+ real mobile users. Amazon cannot block these IPs without blocking real customers.
100K+ Unique IPs Per Modem
Each 4G/5G modem can access over 100,000 unique IP addresses through carrier rotation. Toggling airplane mode or triggering an API rotation request assigns a completely new IP from the carrier pool.
Legitimate Traffic Mix
Mobile IPs carry real user traffic — people browsing, shopping, streaming. Your Amazon Seller Central sessions blend into this legitimate traffic pattern, making behavioral detection nearly impossible.
High Trust Score
Amazon internal trust scoring ranks IP types: mobile carrier > residential ISP > commercial ISP > datacenter. Mobile IPs receive the highest base trust score because they represent real consumer connections.
No Pool Degradation
Unlike residential proxy pools that degrade as IPs get flagged from overuse by multiple customers, mobile CGNAT pools are continuously refreshed by the carrier. The IP you get today is as clean as it was yesterday.
Amazon-Specific Proxy Configuration
Amazon expects consistent IPs during seller sessions. Per-request rotation triggers security alerts. Use the same IP for entire login → work → logout sessions.
Rotate IP between separate sessions (morning vs evening). Never mid-session. Match natural work patterns.
US proxy for amazon.com, UK proxy for amazon.co.uk, DE proxy for amazon.de. Mismatched geolocations trigger security reviews.
SOCKS5 handles all traffic types cleanly. HTTP proxies work but may have issues with WebSocket connections used by Seller Central.
WebRTC can leak your real IP address even when using a proxy. Disable it completely in your antidetect browser profile settings.
DNS queries should resolve through the proxy, not your local DNS. A DNS leak shows your real ISP to Amazon while the HTTP traffic comes from the proxy IP.
Proxy Type Comparison for Amazon
| Proxy Type | Amazon Trust | Detection Risk | Verdict |
|---|---|---|---|
| 4G/5G Mobile | Highest | Very Low | Best choice for stealth accounts |
| Residential | High | Low-Medium | Acceptable but pools degrade over time |
| ISP/Static Residential | Medium | Medium | Risky — single IP with no rotation option |
| Datacenter | None | Very High | Instantly flagged — never use for Amazon |
| Free VPN | None | Extreme | Blacklisted IPs — account will be suspended immediately |
Identity & Payment Separation
Even with perfect technical isolation (browser, proxy, device), using linked identity documents or payment methods will expose the connection. Every piece of identifying information must be unique.
Identity Documents
Amazon requires government-issued identification for seller accounts. The safest approach is to use a trusted person's real identity — a spouse, sibling, parent, or close business partner who understands the situation and consents fully.
Best Option
Trusted family member with their own SSN/EIN, real address, and legitimate identity documents. They understand the business and consent to having an account in their name.
Business Entity
Form a new LLC or corporation — this generates a unique EIN (Employer Identification Number) that is legally separate from your personal SSN. Costs $50-500 depending on state.
International
For non-US sellers, use an ITIN (Individual Taxpayer Identification Number) application through the IRS. Different passport/national ID from a different person.
Warning: Submitting false government documents (fake IDs, fake SSNs) is identity fraud — a federal crime. Using someone's identity without their knowledge and consent is identity theft. These are not civil matters; they carry criminal penalties. Always use legitimate documents with full consent.
Email & Phone Number
Email Address
Create a new email address at least 2-3 months before you need it. Amazon flags recently created emails as suspicious. Use Gmail or Outlook — avoid ProtonMail or Tutanota (Amazon has flagged privacy-focused providers). The email username should look like a real person, not a business keyword string. Build some history: subscribe to newsletters, exchange emails with real addresses.
Phone Number
Get a real prepaid SIM card from a carrier (T-Mobile, AT&T, Verizon, etc.). Amazon detects and flags VoIP numbers — Google Voice, TextNow, Skype numbers, and similar virtual phone services. The phone number must be able to receive SMS verification codes and voice calls. Keep the SIM active with at least a minimal prepaid balance — Amazon occasionally re-verifies phone numbers, and a disconnected number triggers a security hold.
Business Address
Use a completely different physical address from your main account. Options include a family member's address, a PO box (works for some fields but not all), a virtual office service (Regus, WeWork), or a registered agent's address. Amazon normalizes addresses to USPS format and compares across accounts — same zip code + similar street name can trigger reviews.
Payment Method Isolation
Amazon cross-references payment methods across all seller accounts in all marketplaces. The same credit card, bank account, or even the same card BIN (first 6 digits) + billing zip code combination can link accounts.
Services like FlexCard provide unique card numbers with unique BINs and unique billing addresses. Each VCC is a completely separate payment instrument. Best option for payment isolation.
Open a new bank account at a different bank under the new business entity. Used for Amazon disbursements (seller payouts). Must not be linked to any account used on your main Amazon account.
Visa/Mastercard prepaid cards from retail stores. Work for initial account setup but may have limits that cause issues during high-volume selling. Not ideal for long-term use.
Registration Process
Once your antidetect browser profile, proxy, identity documents, and payment methods are ready, follow this registration sequence:
Account Warming Strategy
A new account that immediately starts bulk-listing products is indistinguishable from a bot to Amazon's detection system. The warming phase builds organic account history and performance metrics over 30 days.
Days 1-3: Foundation
Why this matters
Amazon monitors new account behavior. Accounts that immediately start listing products look automated. Real sellers spend time setting up their profile and learning the platform.
Days 4-7: First Activity
Why this matters
Buyer activity before seller activity is a strong trust signal. Starting with a few listings (not 50) matches normal new-seller behavior. Original content avoids duplicate-content detection.
Days 8-14: Building Traction
Why this matters
Gradual listing growth mimics a real new seller learning the ropes. Fast response times and quick shipping build positive performance metrics. FBA enrollment signals commitment to the platform.
Days 15-30: Stabilization
Why this matters
By day 30, your account should have organic sales history, positive metrics, and consistent login patterns. This is when the account transitions from "new and suspicious" to "established and trusted" in Amazon systems.
8 Detection Triggers That Get Stealth Accounts Caught
Most stealth accounts are detected not through sophisticated fingerprinting but through careless operational mistakes. These are the 8 most common failures, ranked by severity.
Using the Same Wi-Fi Network
Why It Gets Caught
Accessing both your original (suspended) account and stealth account from the same home Wi-Fi exposes the same public IP address to Amazon. Even if you use a proxy for the stealth account, a single accidental direct connection (proxy drops, browser misconfiguration, DNS leak) permanently links both accounts.
Fix
Never access the stealth account from your home network without a proxy. Use a kill switch in your VPN/proxy software that blocks all traffic if the proxy connection drops. Better yet: use a dedicated device on a separate network (mobile hotspot with a different carrier).
Copy-Pasting Listings Between Accounts
Why It Gets Caught
Amazon runs text similarity analysis on all product listings. Identical or near-identical titles, bullet points, descriptions, and backend keywords between two accounts are a strong link signal. Even paraphrasing the same content triggers similarity detection — Amazon uses semantic analysis, not just string matching.
Fix
Write completely original product listings for the stealth account. Different product photography, different description structure, different keyword strategy. If selling similar products, vary the angle (e.g., focus on different features, different target audience).
Logging into Wrong Account in Wrong Profile
Why It Gets Caught
Accidentally logging into your stealth account from your main browser (or vice versa) is the single most common cause of account linking. One login event from the wrong browser fingerprint + wrong IP permanently associates the accounts in Amazon database.
Fix
Label your antidetect browser profiles clearly (e.g., "STEALTH - DO NOT USE FOR MAIN"). Use different desktop wallpapers or themes for different profiles so you get a visual cue. Never save Amazon passwords in your regular browser.
Using the Same Phone Number
Why It Gets Caught
Amazon requires phone verification for seller accounts. Using the same phone number on two accounts — even briefly during setup — permanently links them. Amazon also detects VoIP numbers (Google Voice, TextNow, Skype) and flags accounts verified with these services.
Fix
Buy a prepaid SIM card specifically for the stealth account. Use a real carrier SIM, not VoIP. Some sellers use a cheap burner phone with a prepaid plan just for the verification SMS. Keep the SIM active — Amazon occasionally re-verifies.
Inconsistent Login Patterns
Why It Gets Caught
Amazon tracks login times, session durations, and behavioral patterns. If your stealth account has login patterns that mirror your main account (same hours, same session lengths, same browsing paths), the ML-based behavioral analysis flags this as suspicious.
Fix
Log into the stealth account at different times than your main account. Vary session lengths. Do not follow identical browsing paths (e.g., do not always check the same reports in the same order). Use natural variation in your behavior.
Sharing Suppliers or Invoice Data
Why It Gets Caught
When applying for category ungating or brand approval, Amazon requires supplier invoices. If two accounts submit invoices from the same supplier with similar product lists, Amazon links the accounts through the supply chain data.
Fix
Use different suppliers for the stealth account. If using the same manufacturer, have invoices issued under a different business entity name. Consider different product categories to avoid supplier overlap entirely.
Reusing Product Images
Why It Gets Caught
Amazon performs perceptual hashing on product images. Uploading the same photos (even with minor edits like cropping or color adjustment) to listings on two accounts links them. The perceptual hash catches resized, filtered, and watermarked variants.
Fix
Take completely new product photos for the stealth account. Different angles, different lighting, different background. If using a white background, vary the shadow style and image dimensions. Strip all EXIF metadata from photos before uploading.
Using Datacenter Proxies or Free VPNs
Why It Gets Caught
Amazon maintains a database of known datacenter IP ranges and VPN exit nodes. Datacenter IPs are not used by real consumers — any seller account exclusively accessed from datacenter IPs is automatically flagged for review. Free VPNs are even worse: their IP pools are heavily blacklisted.
Fix
Use mobile proxies (4G/5G) with carrier-grade NAT. Mobile IPs are shared by thousands of real users, making them trusted by Amazon. Residential proxies are acceptable but less reliable than mobile due to pool degradation from overuse by other proxy customers.
Marketplace-Specific Considerations
Amazon links accounts across marketplaces — a stealth account on amazon.com can be linked to your existing account on amazon.co.uk, amazon.de, or amazon.co.jp. Each marketplace has different verification requirements and detection levels.
Amazon.com (US)
Verification Required
SSN or ITIN required, video verification calls, utility bill verification, bank account verification
Detection Notes
Most sophisticated detection system. ML-based behavioral analysis. Video calls during onboarding (since 2023). Two-step verification mandatory. Account Health Dashboard monitors all metrics in real-time.
Proxy Recommendation
US mobile proxy (4G/5G). T-Mobile and AT&T CGNAT IPs have the highest trust scores. Avoid datacenter IPs entirely.
2M+ active sellers, $356B marketplace GMV, highest competition and scrutiny
Amazon.co.uk (UK)
Verification Required
Passport or driving license, utility bill, UK bank account or international credit card
Detection Notes
Shares detection infrastructure with US marketplace. Accounts linked across amazon.com and amazon.co.uk automatically. Creating a US stealth account can expose your UK account and vice versa.
Proxy Recommendation
UK mobile proxy. EE and Three UK CGNAT IPs recommended. Same browser profile rules as US.
300K+ active sellers, second-largest Western marketplace, cross-linked with EU marketplaces
Amazon.de (Germany)
Verification Required
ID verification (Personalausweis), German bank account preferred, VAT registration for EU sellers, Impressum (legal notice) required
Detection Notes
EU accounts are unified — creating a .de account also creates .fr, .it, .es, .nl, .pl, .se accounts under the same umbrella. Detection systems are shared across all EU marketplaces. German tax authorities cooperate with Amazon.
Proxy Recommendation
German mobile proxy. Deutsche Telekom and Vodafone DE CGNAT IPs. Must match business address country.
250K+ active sellers, largest EU marketplace, strict regulatory environment (Verpackungsgesetz, WEEE)
Amazon.co.jp (Japan)
Verification Required
Passport, Japanese bank account or international credit card, phone verification, business registration (for Japanese entities)
Detection Notes
Separate infrastructure from US/EU but increasingly linked. Japanese IP addresses required during setup. Detection focuses heavily on product authenticity and brand rights. JCT (Japanese Consumption Tax) registration may be required.
Proxy Recommendation
Japanese mobile proxy. SoftBank, NTT docomo, au (KDDI) CGNAT IPs. Japanese-language browser locale settings required.
200K+ active sellers, third-largest marketplace globally, high-trust consumer base
Post-Creation Best Practices
Creating the stealth account is the first challenge. Keeping it alive and undetected long-term requires consistent operational discipline.
Always Use Your Antidetect Profile
Maintain Excellent Account Health
Behavioral Consistency
IP & Fingerprint Hygiene
Frequently Asked Questions
Detailed answers to the most common questions about Amazon stealth accounts, detection systems, and operational security.
Ready to Set Up Your Amazon Stealth Account?
Start with the right foundation. Our 4G/5G mobile proxies provide carrier-grade IPs with CGNAT — the highest trust level for Amazon seller accounts. Dedicated physical devices, sticky sessions up to 24 hours, and API-based rotation for when you need it.
Legal Disclaimer
Creating multiple Amazon seller accounts violates Amazon's Terms of Service. This guide is published for informational and educational purposes only. Coronium.io does not encourage or endorse violations of any platform's terms of service.
Our 4G/5G mobile proxies are intended for legal and legitimate use. It is the user's sole responsibility to ensure compliance with the terms of service of the platforms they access and with all applicable laws and regulations in their jurisdiction. We do not condone the use of false identity documents, tax fraud, or any illegal activity.
By using our services, you agree to use them in accordance with all applicable laws. We will not be held liable for any misuse. Please read our Terms of Service and Privacy Policy before using our services.
Configure & Buy Mobile Proxies
Select from 10+ countries with real mobile carrier IPs and flexible billing options
Choose Billing Period
Select the billing cycle that works best for you
SELECT LOCATION
when you order 5+ proxy ports
Carrier & Region
Available regions:
Included Features
🇺🇸USA Configuration
AT&T • Florida • Monthly Plan
Your price:
$129
/month
Unlimited Bandwidth
No commitment • Cancel anytime • Purchase guide
Perfect For
Popular Proxy Locations
Secure payment methods accepted: Credit Card, PayPal, Bitcoin, and more. 2 free modem replacements per 24h.