Emergency: I Was Scammed
Immediate steps if your crypto wallet was drained. Revoke approvals, secure remaining assets, and report the crime.
Get Help NowFlagship
Everything else orbits these. Real-time data, open APIs, deep analysis, on-chain intelligence — free and unlimited.
Stream of phishing detections as they happen — domain, brand, registrar, cloaking flags. Refreshed continuously.
Watch the feed →Per-domain dossiers: WHOIS, DNS, TLS, VirusTotal, cloaking, kit fingerprint, abuse-report history. Searchable.
Browse reports →Check a domain, pull a feed, bulk-scan 500/req. 834K+ threat records, CC-BY licensed, zero cost.
Read API docs →Paste any URL — get VirusTotal consensus, drainer-kit fingerprint, cloaking test, SSL chain, screenshot.
Analyze now →Drainer addresses, rug-pull wallets, linked infrastructure across EVM + Solana. Flagged, searchable, exportable.
Search wallets →Community-curated threat feed on GitHub. Auto-updated domain blocklist for firewalls, DNS filters, browser extensions.
View on GitHub →Platform Directory
Supporting tools, research dashboards, guides and experimental projects — grouped by purpose.
They call us Enemy #1
Scammers continuously target our project and infrastructure to escape bans. One recent example is the enforced removal of our X/Twitter account used for posting reports. Attacks are constant and varied.
Outcome stays the same: we scan, flag, and kill domains before victims lose funds. Our takedowns cost $0. Their attempts burn money and time for no gain.
Domains reported
Active phishing domains preempted
Reports mirrored from X/Twitter
Paid to registrars or platforms for takedowns — ever
Knowledge is your best defense. Learn the most common deception tactics to avoid becoming the next victim.
If you've been a victim of a scam, reporting it is crucial. Filing a report on platforms like Chainabuse is a minimum first step. Ideally, you should report the incident to your local law enforcement. For expert guidance on legal matters or theft, we highly recommend contacting Seal911, a group of professionals who can provide sound advice for your situation.
Be extremely cautious of "recovery services" that contact you after a theft. Most are recovery scams trying to victimize you a second time.
Trusted By Industry Leaders
Our threat intelligence is integrated into wallets, exchanges, and security tools protecting millions worldwide.
For Developers
Free, open, no API key. Real-time domain risk scoring across 834K+ threats.
| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/check?domain= | Single check |
| POST | /v1/check/bulk | Bulk (500/req) |
| GET | /v1/search?q= | Keyword search |
| GET | /v1/feed/{list} | Full feeds |
| GET | /v1/stats | Live stats |
Live Intelligence
Real-time phishing threats detected and neutralized by our automated systems
Protect Yourself
Immediate steps if your crypto wallet was drained. Revoke approvals, secure remaining assets, and report the crime.
Get Help NowStep-by-step guide to hardening your crypto security. Hardware wallets, 2FA settings, and browsing hygiene.
Open ChecklistRecommended privacy tools, secure browsers, VPNs, and operating systems to stay anonymous online.
Explore Tools
What we do
We provide a comprehensive, multi-layered approach to neutralizing online threats, from initial detection to full infrastructure takedown.
We assist in identifying scam teams and filing actionable reports with law enforcement.
We reconstruct threat chains across multiple domains, assets, and wallets.
We build detection templates and automate code analysis to instantly block scams.
Hall of Shame
Disclaimer: All characters in this section are fictional and presented in a humorous, parody style for entertainment purposes only. They are not connected to any real individuals. Inspired by public nicknames and open cases, with no personal data or direct accusations included.
Support & Legal
Non-commercial, volunteer project. We are an open community focused on identifying, documenting, and disrupting phishing and scam infrastructure for public benefit.
No whitelist or ignore list. We do not maintain any whitelist/ignore program. Duplicate suppression only prevents re-adding the same domain.
Appeal removes the domain. If an appeal is approved, the domain is removed from our database and from any places where we published it.
Ticket-only tracking. We do not store personal data. For status checks and takedown requests we use a ticket ID only.
Act fast and preserve evidence: URLs, TXIDs, wallet addresses, screenshots, timestamps, chat logs. File an official report. For prevention, read our Crypto Security Essentials guide.
For any incident, I strongly recommend contacting the SEAL 911 Bot. This is a rapid response group of professionals who really know their stuff and can help in any situation.