Live Threat Intelligence
Real-time feed of phishing sites detected, analyzed, and flagged by our automated systems worldwide.
View Live FeedReal-time feed of phishing sites detected, analyzed, and flagged by our automated systems worldwide.
View Live FeedRESTful API for domain checks, bulk lookups, and full threat feeds. Integrate our data into your SOC.
Explore APIFull site analysis: screenshots, DNS, WHOIS, SSL cert, phishing kit detection, and risk scoring.
Analyze NowDirect escalations to registrars and hosting providers with evidence packages for fast domain removal.
Submit ReportSearchable database of flagged crypto wallets linked to phishing drainers, rug pulls, and DeFi exploits.
Explore WalletsCommunity-curated threat feed on GitHub. Auto-updated domain blocklist for firewalls and DNS filters.
View on GitHubReport suspicious URLs directly. Instant automated analysis, evidence logging, and takedown initiation.
Open BotPractical guide to avoid scams: wallet safety, approval hygiene, red flags, and emergency response.
Read GuideThey call us Enemy #1
Scammers continuously target our project and infrastructure to escape bans. One recent example is the enforced removal of our X/Twitter account used for posting reports. Attacks are constant and varied.
Outcome stays the same: we scan, flag, and kill domains before victims lose funds. Our takedowns cost $0. Their attempts burn money and time for no gain.
Domains reported
Active phishing domains preempted
Reports mirrored from X/Twitter
Paid to force X/Twitter removal
Knowledge is your best defense. Learn the most common deception tactics to avoid becoming the next victim.
If you've been a victim of a scam, reporting it is crucial. Filing a report on platforms like Chainabuse is a minimum first step. Ideally, you should report the incident to your local law enforcement. For expert guidance on legal matters or theft, we highly recommend contacting Seal911, a group of professionals who can provide sound advice for your situation.
Be extremely cautious of "recovery services" that contact you after a theft. Most are recovery scams trying to victimize you a second time.
For Developers
Free, open, no API key. Real-time domain risk scoring across 770K+ threats.
| GET | /v1/check?domain= | Single check |
| POST | /v1/check/bulk | Bulk (500/req) |
| GET | /v1/search?q= | Keyword search |
| GET | /v1/feed/{list} | Full feeds |
| GET | /v1/stats | Live stats |
Live Intelligence
Real-time phishing threats detected and neutralized by our automated systems
Security Guide
Use our real-time scanner to verify if a website is malicious. Get instant results and threat analysis.
Scan NowSend suspicious URLs directly to our Telegram bot for immediate analysis and takedown action.
Report NowNever enter personal information on suspicious sites. Our community helps identify threats in real-time.
Follow UpdatesProtect Yourself
Immediate steps if your crypto wallet was drained. Revoke approvals, secure remaining assets, and report the crime.
Get Help NowStep-by-step guide to hardening your crypto security. Hardware wallets, 2FA settings, and browsing hygiene.
Open ChecklistRecommended privacy tools, secure browsers, VPNs, and operating systems to stay anonymous online.
Explore ToolsWho we are
We are volunteer cybersecurity fighters dedicated to destroying phishing schemes and protecting users from crypto scams. Through years of active combat, we've built a reputation that enables us to ban phishing domains exponentially faster than before.
Our automated community-driven system means people send us phishing domains they encounter, and our system conducts analysis before automatically sending reports to antiviruses, scanners, VirusTotal, and security providers worldwide.
We've helped Google fight phishing in ads, battled fake crypto airdrops on YouTube, and created automated death systems for illegal scammer earnings.
Domains in Database
Active Threats
Primary Reports
What we do
We provide a comprehensive, multi-layered approach to neutralizing online threats, from initial detection to full infrastructure takedown.
We assist in identifying scam teams and filing actionable reports with law enforcement.
We reconstruct threat chains across multiple domains, assets, and wallets.
We build detection templates and automate code analysis to instantly block scams.
Our Mission
Forget paid plans and brand protection nonsense. We don't beg for money - we wage war! Our goal? Crush phishing attacks on crypto users with brutal efficiency.
No fees, just pure destruction. Let's burn the scammers down!
Hall of Shame
Disclaimer: All characters in this section are fictional and presented in a humorous, parody style for entertainment purposes only. They are not connected to any real individuals. Inspired by public nicknames and open cases, with no personal data or direct accusations included.
Support & Legal
Non-commercial, volunteer project. We are an open community focused on identifying, documenting, and disrupting phishing and scam infrastructure for public benefit.
No whitelist or ignore list. We do not maintain any whitelist/ignore program. Duplicate suppression only prevents re-adding the same domain.
Appeal removes the domain. If an appeal is approved, the domain is removed from our database and from any places where we published it.
Ticket-only tracking. We do not store personal data. For status checks and takedown requests we use a ticket ID only.
Act fast and preserve evidence: URLs, TXIDs, wallet addresses, screenshots, timestamps, chat logs. File an official report. For prevention, read our Crypto Security Essentials guide.
For any incident, I strongly recommend contacting the SEAL 911 Bot. This is a rapid response group of professionals who really know their stuff and can help in any situation.