Live Threat Intelligence
Real-time feed of phishing sites detected, analyzed, and flagged by our automated systems worldwide.
View Live FeedOur Services
Real-time feed of phishing sites detected, analyzed, and flagged by our automated systems worldwide.
View Live FeedRESTful API for domain checks, bulk lookups, and full threat feeds. Integrate our data into your SOC.
Explore APIFull site analysis: screenshots, DNS, WHOIS, SSL cert, phishing kit detection, and risk scoring.
Analyze NowDirect escalations to registrars and hosting providers with evidence packages for fast domain removal.
Submit ReportSearchable database of flagged crypto wallets linked to phishing drainers, rug pulls, and DeFi exploits.
Explore WalletsCommunity-curated threat feed on GitHub. Auto-updated domain blocklist for firewalls and DNS filters.
View on GitHubReport suspicious URLs directly. Instant automated analysis, evidence logging, and takedown initiation.
Open BotPractical guide to avoid scams: wallet safety, approval hygiene, red flags, and emergency response.
Read GuideTrack the notorious Angel Drainer toolkit — real-time stats, detected domains, and takedown progress.
Explore HubFake WalletConnect interfaces stealing seed phrases. See all tracked domains and infrastructure.
Explore HubFast-growing threat targeting Solana ecosystem. Draining SOL and SPL tokens via transaction signing.
Explore HubThey call us Enemy #1
Scammers continuously target our project and infrastructure to escape bans. One recent example is the enforced removal of our X/Twitter account used for posting reports. Attacks are constant and varied.
Outcome stays the same: we scan, flag, and kill domains before victims lose funds. Our takedowns cost $0. Their attempts burn money and time for no gain.
Domains reported
Active phishing domains preempted
Reports mirrored from X/Twitter
Paid to force X/Twitter removal
Knowledge is your best defense. Learn the most common deception tactics to avoid becoming the next victim.
If you've been a victim of a scam, reporting it is crucial. Filing a report on platforms like Chainabuse is a minimum first step. Ideally, you should report the incident to your local law enforcement. For expert guidance on legal matters or theft, we highly recommend contacting Seal911, a group of professionals who can provide sound advice for your situation.
Be extremely cautious of "recovery services" that contact you after a theft. Most are recovery scams trying to victimize you a second time.
For Developers
Free, open, no API key. Real-time domain risk scoring across 770K+ threats.
| Method | undefinedundefinedEndpoint | undefinedundefinedDescription | undefinedundefined
|---|---|---|
| GET | undefinedundefined/v1/check?domain= | undefinedundefinedSingle check | undefinedundefined
| POST | undefinedundefined/v1/check/bulk | undefinedundefinedBulk (500/req) | undefinedundefined
| GET | undefinedundefined/v1/search?q= | undefinedundefinedKeyword search | undefinedundefined
| GET | undefinedundefined/v1/feed/{list} | undefinedundefinedFull feeds | undefinedundefined
| GET | undefinedundefined/v1/stats | undefinedundefinedLive stats | undefinedundefined
Live Intelligence
undefinedundefinedReal-time phishing threats detected and neutralized by our automated systems
Security Guide
Use our real-time scanner to verify if a website is malicious. Get instant results and threat analysis.
undefinedundefinedScan NowSend suspicious URLs directly to our Telegram bot for immediate analysis and takedown action.
undefinedundefinedReport NowNever enter personal information on suspicious sites. Our community helps identify threats in real-time.
undefinedundefinedFollow UpdatesProtect Yourself
undefinedundefinedImmediate steps if your crypto wallet was drained. Revoke approvals, secure remaining assets, and report the crime.
undefinedundefinedGet Help NowundefinedundefinedStep-by-step guide to hardening your crypto security. Hardware wallets, 2FA settings, and browsing hygiene.
undefinedundefinedOpen ChecklistundefinedundefinedRecommended privacy tools, secure browsers, VPNs, and operating systems to stay anonymous online.
undefinedundefinedExplore ToolsundefinedundefinedWho we are
undefinedundefinedWe are volunteer cybersecurity fighters dedicated to destroying phishing schemes and protecting users from crypto scams. Through years of active combat, we've built a reputation that enables us to ban phishing domains exponentially faster than before.
undefinedundefinedOur automated community-driven system means people send us phishing domains they encounter, and our system conducts analysis before automatically sending reports to antiviruses, scanners, VirusTotal, and security providers worldwide.
undefinedundefinedWe've helped Google fight phishing in ads, battled fake crypto airdrops on YouTube, and created automated death systems for illegal scammer earnings.
undefinedundefinedundefinedundefined0undefinedundefined+undefinedundefined
undefinedundefinedDomains in Database
undefinedundefinedundefinedundefined0undefinedundefined+undefinedundefined
undefinedundefinedActive Threats
undefinedundefinedundefinedundefined0undefinedundefined+undefinedundefined
undefinedundefinedPrimary Reports
undefinedundefined
undefinedundefined
undefinedundefinedWhat we do
undefinedundefinedWe provide a comprehensive, multi-layered approach to neutralizing online threats, from initial detection to full infrastructure takedown.
undefinedundefinedWe assist in identifying scam teams and filing actionable reports with law enforcement.
undefinedundefinedWe reconstruct threat chains across multiple domains, assets, and wallets.
undefinedundefinedWe build detection templates and automate code analysis to instantly block scams.
undefinedundefined
undefinedundefinedOur Mission
undefinedundefinedForget paid plans and brand protection nonsense. We don't beg for money - we wage war! Our goal? Crush phishing attacks on crypto users with brutal efficiency.
undefinedundefinedNo fees, just pure destruction. Let's burn the scammers down!
undefinedundefinedHall of Shame
undefinedundefinedundefinedundefinedDisclaimer: All characters in this section are fictional and presented in a humorous, parody style for entertainment purposes only. They are not connected to any real individuals. Inspired by public nicknames and open cases, with no personal data or direct accusations included. undefinedundefined
undefinedundefinedSupport & Legal
undefinedundefinedundefinedundefinedNon-commercial, volunteer project. We are an open community focused on identifying, documenting, and disrupting phishing and scam infrastructure for public benefit.undefinedundefined
undefinedundefinedundefinedundefinedNo whitelist or ignore list. We do not maintain any whitelist/ignore program. Duplicate suppression only prevents re-adding the same domain.undefinedundefined
undefinedundefinedundefinedundefinedAppeal removes the domain. If an appeal is approved, the domain is removed from our database and from any places where we published it.undefinedundefined
undefinedundefinedundefinedundefinedTicket-only tracking. We do not store personal data. For status checks and takedown requests we use a undefinedundefinedticket ID only.undefinedundefined
undefinedundefinedAct fast and preserve evidence: URLs, TXIDs, wallet addresses, screenshots, timestamps, chat logs. File an official report. For prevention, read our undefinedundefinedCrypto Security Essentials guide.undefinedundefined
undefinedundefinedFor any incident, I strongly recommend contacting the undefinedundefinedSEAL 911 Bot. This is a rapid response group of professionals who really know their stuff and can help in any situation.undefinedundefined
undefinedundefinedundefined undefined