Our Services

Advanced Cybersecurity Solutions

They call us Enemy #1

Relentless Attacks. Zero Effect.

Scammers continuously target our project and infrastructure to escape bans. One recent example is the enforced removal of our X/Twitter account used for posting reports. Attacks are constant and varied.

Outcome stays the same: we scan, flag, and kill domains before victims lose funds. Our takedowns cost $0. Their attempts burn money and time for no gain.

Since 2019
0 +

Domains reported

Since Jul 1, 2025
0 +

Active phishing domains preempted

Public Backup
0 +

Reports mirrored from X/Twitter

Latest takedown price
$0 +

Paid to force X/Twitter removal

Warning: Crypto Scams Ahead

Knowledge is your best defense. Learn the most common deception tactics to avoid becoming the next victim.

Fake Returns

Scammers lure victims by promising unrealistically high returns on investments. These can be Ponzi schemes, where early investors are paid with funds from newer ones, or "pump and dump" schemes, where an asset's price is artificially inflated and then crashed.

Case Study: "CryptoRocket" Project

An investor, "Alex," put $5,000 into a project promising 100% daily profits. The first few "payouts" arrived, funded by new investors. Once the flow of new money stopped, the site and social media vanished, along with all the funds.

See real drainer cases

Impersonation

Criminals pretend to be famous personalities, celebrities, major investors, or representatives of official projects. Their goal is to persuade you to send them money for an "exclusive" giveaway or investment round.

Case Study: The "Elon Musk Giveaway"

A scammer created a fake Twitter account mimicking Elon Musk and announced a crypto giveaway. Users were asked to send 0.1 ETH to "verify their address" to receive 1 ETH in return. Unsurprisingly, no one received the promised reward.

How scam teams operate

Sextortion

Attackers claim to possess compromising photos or videos of you and threaten to release them unless you pay a ransom in cryptocurrency. Often, these threats are bluffs designed to exploit your fear.

Case Study: The "Hacked Webcam" Email

Maria received an email claiming her webcam was hacked and a compromising video was recorded. The blackmailer demanded $1,000 in BTC, threatening to send the video to all her contacts. Maria ignored the email, and nothing ever happened.

Protect yourself now

Rug Pull

A development team creates a crypto project, raises funds from investors by selling tokens, and then suddenly disappears, taking all the money and deleting their website and social media. The liquidity is pulled, making the token worthless.

Case Study: "LunarSwap" Project

A new DeFi project, "LunarSwap," raised millions, promising revolutionary exchange technology. A month after launch, the developers drained all liquidity from the trading pair, crashing the token price to zero, and vanished from the internet.

Exposed: wallet drainer panels

Blackmail

A scammer threatens to release sensitive information, cause harm to the victim or their systems, or take other malicious actions unless a crypto payment is made. It preys on fear and intimidation.

Case Study: The "DDoS Threat"

An online business owner received an email threatening a massive Distributed Denial-of-Service (DDoS) attack that would crash their website unless they paid 2 ETH. The threat was designed to extort money by preventing business disruption.

What to do if threatened

Ransomware

An attacker encrypts your computer system or personal files, making them inaccessible. They then demand a ransom payment, usually in cryptocurrency, to restore access.

Case Study: The "Locked Files" Attack

A company's network was infected with ransomware, encrypting all critical financial data. The attackers demanded 5 BTC to provide the decryption key. The company was forced to negotiate, highlighting the severe disruption these attacks cause.

Build your digital fortress

Phishing

The most common type of scam. Criminals create fake websites that mimic well-known crypto wallets, exchanges, or projects. The goal is to trick you into entering your seed phrase or private key to steal your assets.

Case Study: The "Fake MetaMask" Site

A user received an email, supposedly from MetaMask support, asking them to urgently "verify" their wallet due to a security update. The link led to a perfect replica of the official site. After entering the seed phrase, all funds were stolen.

Don't Be Silent! Your Silence is Their Power.

If you've been a victim of a scam, reporting it is crucial. Filing a report on platforms like Chainabuse is a minimum first step. Ideally, you should report the incident to your local law enforcement. For expert guidance on legal matters or theft, we highly recommend contacting Seal911, a group of professionals who can provide sound advice for your situation.

Be extremely cautious of "recovery services" that contact you after a theft. Most are recovery scams trying to victimize you a second time.

For Developers

Destroy API

Free, open, no API key. Real-time domain risk scoring across 770K+ threats.

Endpoints
5
Bulk Limit
500 /req
Auth
None
Sync
Hourly
api.destroy.tools
undefinedundefined$ curl "https://api.destroy.tools/v1/check?domain=suspicious-site.xyz"
{
undefinedundefined"threat": undefinedundefinedtrue,
undefinedundefined"risk_score": undefinedundefined85,
undefinedundefined"severity": undefinedundefined"critical",
undefinedundefined"sources": [undefinedundefined"destroylist", undefinedundefined"community"],
undefinedundefined"dns_active": undefinedundefinedtrue
}
Threat Scoring (0—100)
Critical 70—100 High 40—69 Medium 20—39 Low 1—19
Available Endpoints
undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined
MethodEndpointDescription
GET/v1/check?domain=Single check
POST/v1/check/bulkBulk (500/req)
GET/v1/search?q=Keyword search
GET/v1/feed/{list}Full feeds
GET/v1/statsLive stats
undefinedundefined

Live Intelligence

undefinedundefined

Latest Detections

undefinedundefined

Real-time phishing threats detected and neutralized by our automated systems

undefinedundefined

Security Guide

Found Phishing? Here's What To Do

undefinedundefinedundefinedundefined

undefinedundefined1. Scan the URLundefinedundefined

undefinedundefined

Use our real-time scanner to verify if a website is malicious. Get instant results and threat analysis.

undefinedundefinedScan Now
undefinedundefinedundefinedundefined

undefinedundefined2. Report to Our Botundefinedundefined

undefinedundefined

Send suspicious URLs directly to our Telegram bot for immediate analysis and takedown action.

undefinedundefinedReport Now
undefinedundefinedundefinedundefined

undefinedundefined3. Stay Protectedundefinedundefined

undefinedundefined

Never enter personal information on suspicious sites. Our community helps identify threats in real-time.

undefinedundefinedFollow Updates
undefinedundefined

Protect Yourself

undefinedundefined

Essential Security Resources

undefinedundefined
undefinedundefinedundefinedundefined

undefinedundefinedEmergency: I Was Scammedundefinedundefined

undefinedundefined

Immediate steps if your crypto wallet was drained. Revoke approvals, secure remaining assets, and report the crime.

undefinedundefinedGet Help Nowundefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined

undefinedundefinedUltimate Security Checklistundefinedundefined

undefinedundefined

Step-by-step guide to hardening your crypto security. Hardware wallets, 2FA settings, and browsing hygiene.

undefinedundefinedOpen Checklistundefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined

undefinedundefinedPrivacy Arsenal & Toolsundefinedundefined

undefinedundefined

Recommended privacy tools, secure browsers, VPNs, and operating systems to stay anonymous online.

undefinedundefinedExplore Toolsundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

Who we are

undefinedundefined

Terminators of Phishing & Scam Destruction Squad

undefinedundefined

We are volunteer cybersecurity fighters dedicated to destroying phishing schemes and protecting users from crypto scams. Through years of active combat, we've built a reputation that enables us to ban phishing domains exponentially faster than before.

undefinedundefined

Our automated community-driven system means people send us phishing domains they encounter, and our system conducts analysis before automatically sending reports to antiviruses, scanners, VirusTotal, and security providers worldwide.

undefinedundefined

We've helped Google fight phishing in ads, battled fake crypto airdrops on YouTube, and created automated death systems for illegal scammer earnings.

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined
undefinedundefined

undefinedundefined0undefinedundefined+undefinedundefined

undefinedundefined

Domains in Database

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined
undefinedundefined

undefinedundefined0undefinedundefined+undefinedundefined

undefinedundefined

Active Threats

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined
undefinedundefined

undefinedundefined0undefinedundefined+undefinedundefined

undefinedundefined

Primary Reports

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedCybersecurity team fighting phishing and scamsundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedSecurity illustration showing threat neutralizationundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

What we do

undefinedundefined

A Free Solution to Take Down Scammers

undefinedundefined

We provide a comprehensive, multi-layered approach to neutralizing online threats, from initial detection to full infrastructure takedown.

undefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined
undefinedundefined

Cooperation with Authorities

undefinedundefined

We assist in identifying scam teams and filing actionable reports with law enforcement.

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined
undefinedundefined

Threat Chain Tracing

undefinedundefined

We reconstruct threat chains across multiple domains, assets, and wallets.

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined
undefinedundefined

Code Analysis & Auto-Detection

undefinedundefined

We build detection templates and automate code analysis to instantly block scams.

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefined undefined undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefinedDestroyer mascot representing scam eliminationundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

Our Mission

undefinedundefined

We're the Terminators of Scammers!

undefinedundefined

Forget paid plans and brand protection nonsense. We don't beg for money - we wage war! Our goal? Crush phishing attacks on crypto users with brutal efficiency.

undefinedundefined
    undefinedundefined
  • Flood phishing forms with 5M+ unique IPs and valid seeds
  • undefinedundefined
  • Team up with authorities to dismantle massive scam networks
  • undefinedundefined
  • Trace threat chains across multi-chain and bridge transactions
  • undefinedundefined
  • Kill domains with auto-detection templates and precision strikes
  • undefinedundefined
  • Block Telegram bots and channels - shut down their scams
  • undefinedundefined
  • Log threats for evidence and help authorities arrest them
  • undefinedundefined
undefinedundefined
undefinedundefinedundefinedundefined Destroy with Us!undefinedundefinedundefinedundefined

No fees, just pure destruction. Let's burn the scammers down!

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefined undefined undefinedundefinedundefined undefined undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

Support & Legal

undefinedundefined

Disclaimer and Frequently Asked Questions

undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

undefinedundefinedundefinedundefined

undefinedundefined
undefinedundefined
undefinedundefined

undefinedundefinedNon-commercial, volunteer project. We are an open community focused on identifying, documenting, and disrupting phishing and scam infrastructure for public benefit.undefinedundefined

undefinedundefined
    undefinedundefined
  • undefinedundefinedOpen by design. Where safe and lawful, indicators and scans are publicly accessible.undefinedundefined
  • undefinedundefined
  • undefinedundefinedNo user databases. We do not store personal data. For appeals and takedown status we use a undefinedundefinedticket ID only.undefinedundefined
  • undefinedundefined
  • undefinedundefinedNo direct takedowns. We submit evidence to registrars, hosting providers, and trusted vendors; enforcement is their decision.undefinedundefined
  • undefinedundefined
  • undefinedundefinedSafe for legitimate sites. Our passive scans and reports do not harm lawful resources.undefinedundefined
  • undefinedundefined
  • undefinedundefinedNo warranties. Content is provided "as is", without guarantees of completeness or fitness.undefinedundefined
  • undefinedundefined
  • undefinedundefinedLawful cooperation. For qualifying cases, artifacts may be shared with competent authorities.undefinedundefined
  • undefinedundefined
undefinedundefined
undefinedundefinedView DisclaimerundefinedundefinedPrivacy PolicyundefinedundefinedTerms of Serviceundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

undefinedundefinedundefinedundefined

undefinedundefined
undefinedundefined
undefinedundefined
    undefinedundefined
  • undefinedundefinedScanning. We perform safe, passive checks to collect artifacts and indicators.undefinedundefined
  • undefinedundefined
  • undefinedundefinedEscalation. We request professional services to verify resources and ask registrars/hosts to review clients via abuse teams.undefinedundefined
  • undefinedundefined
  • undefinedundefinedInvestigations. We occasionally conduct hobby-level OSINT; results are published, shared with peers, or forwarded to authorities. We do not hoard private data. See our undefinedundefinedGambler Panel investigation for an example. Browse all research on our undefinedundefinedNews & Investigations page.undefinedundefined
  • undefinedundefined
  • undefinedundefinedCollaboration. We are open to partnerships. Certain private tools and materials can be shared for defensive purposes on request.undefinedundefined
  • undefinedundefined
  • undefinedundefinedDashboards. Explore stolen funds across all chains via the undefinedundefinedDeFi Hack Explorer or investigate scam infrastructure with our undefinedundefinedScam Intelligence Dashboard.undefinedundefined
  • undefinedundefined
undefinedundefined
undefinedundefinedExplore All Toolsundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

undefinedundefinedundefinedundefined

undefinedundefined
undefinedundefined
undefinedundefined

undefinedundefinedNo whitelist or ignore list. We do not maintain any whitelist/ignore program. Duplicate suppression only prevents re-adding the same domain.undefinedundefined

undefinedundefined

undefinedundefinedAppeal removes the domain. If an appeal is approved, the domain is removed from our database and from any places where we published it.undefinedundefined

undefinedundefined

undefinedundefinedTicket-only tracking. We do not store personal data. For status checks and takedown requests we use a undefinedundefinedticket ID only.undefinedundefined

undefinedundefined
undefinedundefinedSubmit an Appealundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

undefinedundefinedundefinedundefined

undefinedundefined
undefinedundefined
undefinedundefined
    undefinedundefined
  • undefinedundefinedOpen access. The bot is open to everyone, which does not change its purpose: faster disruption of fraud.undefinedundefined
  • undefinedundefined
  • undefinedundefinedNo paid leniency. We have never asked for or accepted payment for unbans or favors. The process and database are open and verifiable.undefinedundefined
  • undefinedundefined
  • undefinedundefinedTrusted reporters. Reputable users may report without pre-moderation and submit bulk complaints for speed.undefinedundefined
  • undefinedundefined
undefinedundefined
undefinedundefinedEmergency Response Guideundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined

undefinedundefinedundefinedundefined

undefinedundefined
undefinedundefined
undefinedundefined

Act fast and preserve evidence: URLs, TXIDs, wallet addresses, screenshots, timestamps, chat logs. File an official report. For prevention, read our undefinedundefinedCrypto Security Essentials guide.undefinedundefined

undefinedundefined
    undefinedundefined
  • United States: https://www.ic3.gov/
  • undefinedundefined
  • United Kingdom: https://www.actionfraud.police.uk/
  • undefinedundefined
  • Other countries: contact your national cybercrime unit or local police
  • undefinedundefined
undefinedundefined
undefinedundefined

Personal Recommendation

undefinedundefined

For any incident, I strongly recommend contacting the undefinedundefinedSEAL 911 Bot. This is a rapid response group of professionals who really know their stuff and can help in any situation.undefinedundefined

undefinedundefined
undefinedundefinedGet Emergency Helpundefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefinedundefined
undefined undefined
undefinedundefinedundefined undefined
undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined undefined undefined undefined