Disclaimer

Important legal notice. By using our services, you agree to the terms outlined below.

Updated Feb 26, 2026 | 8 min read
Important Notice

PhishDestroy is a non-commercial, volunteer-run project. The data and tools we provide are for informational purposes only. We are not a professional security firm, and our services do not constitute legal, financial, or expert cybersecurity advice.

General Disclaimer and "As Is" Service

All information, data, software, and services provided by PhishDestroy are offered in good faith and on an "as is" and "as available" basis. We make no representations or warranties of any kind, express or implied, concerning the accuracy, completeness, reliability, or suitability of the information provided. The cyber threat landscape is constantly evolving, and while we strive for accuracy, our data may contain errors or become outdated. We do not guarantee that our services will be uninterrupted, timely, or error-free. Your use of any information or materials from this project is entirely at your own risk.

Limitation of Liability

In no event shall PhishDestroy, its volunteers, contributors, or any affiliated partners be liable for any direct, indirect, incidental, special, consequential, or punitive damages. This includes, but is not limited to, damages for loss of profits, data, or other intangible losses resulting from:

  • Your access to or use of, or inability to access or use, our services
  • Any conduct or content of any third party on the service
  • Any content obtained from the service
  • Unauthorized access, use, or alteration of your transmissions or content

No Professional Advice

The content provided by PhishDestroy is not a substitute for professional advice. The threat intelligence we share is intended to supplement, not replace, the guidance of qualified cybersecurity professionals, legal counsel, or financial advisors. Decisions based on our data are your sole responsibility.

User Responsibility and Security Hygiene

You are ultimately responsible for your own digital security. We strongly urge all users to:

  • Use strong, unique passwords for all accounts
  • Enable two-factor authentication (2FA) wherever possible
  • Keep all software and systems updated
  • Be skeptical of unsolicited communications
  • Regularly back up important data

Non-Entity & Volunteer Status

PhishDestroy is not a registered legal entity, corporation, LLC, or non-profit organization. It is an informal, volunteer-driven initiative operated by independent contributors. No individual associated with PhishDestroy acts in a professional, corporate, or official capacity. All work is performed voluntarily and without compensation.

Governing Law and Jurisdiction

This Disclaimer shall be governed by the laws of the State of Arizona, United States of America. Any legal action shall be instituted exclusively in the state or federal courts located in Maricopa County, Arizona.

International Compliance & Law Enforcement

PhishDestroy cooperates with law enforcement agencies globally. Our threat intelligence data may be shared with recognized bodies including the FBI (IC3), Europol (EC3), and INTERPOL.

Sanctions

PhishDestroy does not provide services to individuals, entities, or governments subject to sanctions by the United States (OFAC), the European Union, or the United Nations — including Russia (RF), North Korea (DPRK), Iran, Syria, and Cuba.

Indemnification

You agree to indemnify, defend, and hold harmless PhishDestroy and its volunteers from any claims, damages, losses, or fees arising from your use of services, violation of this Disclaimer, violation of third-party rights, or claims that your use of our data caused damage to a third party.

Fair Use & OSINT Purpose

All content published by PhishDestroy is produced for public interest reporting, cybersecurity research, and threat awareness. Where third-party content is reproduced, such use is made under the fair use doctrine (17 U.S.C. § 107) for purposes of criticism, commentary, news reporting, and research.

Safe Harbor & Non-Malicious Intent

PhishDestroy engages exclusively in defensive cybersecurity research using publicly available data, passive reconnaissance, and lawful OSINT techniques. We do not engage in unauthorized access to computer systems.

If any party believes our research has caused harm or contains a factual error, contact us at legal@phishdestroy.io or through our appeals process.

Privacy Note

PhishDestroy does not intentionally collect personal data beyond what is strictly necessary for website operation. For data subjects in the EEA, we acknowledge your rights under GDPR. See our Privacy Policy and GDPR Statement.

Changes & Contact

We may update this Disclaimer to reflect changes in our operations or applicable law. Continued use of our services after changes constitutes acceptance.

For questions: legal@phishdestroy.io · contact@phishdestroy.io

Bias & Transparency

Nobody required us to write this. No regulation, no lawsuit, no third party demanded it. We wrote it because lying by omission is not who we are.

Who We Are

PhishDestroy is a non-commercial, volunteer-driven project. We make zero dollars. We have no sponsors, no advertisers, no paying customers, and no business model. Every hour spent on this project is unpaid. Every investigation is done for free. Every line of code is written without compensation.

When there is no money, there needs to be something else. For us, that something is conviction.

Why We Are Biased

We have spent years documenting how people lose their savings — sometimes everything they have — to phishing pages, fake investment platforms, crypto drainers, and scam operations that take minutes to set up and seconds to destroy someone's life.

That experience left us with a clear, unwavering position: we are against scam and phishing infrastructure, unconditionally and permanently.

"Our motivation is a genuine, deeply personal hatred of scam infrastructure — not of people, but of the domains, the toolkits, the panels, the services, and every technical layer built to steal from others. That hatred is what keeps this project alive at zero pay."

What We Are Biased Against

Phishing & scam domains — every URL built to steal credentials, funds, or personal data
Drainer toolkits & phishing kits — tools that enable anyone to launch fraud in minutes
Negligent infrastructure — registrars & hosts that refuse to act on documented abuse
Scam profiteers — those who build, sell, or maintain tools used for fraud

We target infrastructure, systems, and operations — not personal identities. But when a service is documented as profiting from fraud, we will name it and explain why.

What This Means for You

01

Our language may be aggressive. We call scams what they are. We do not soften our conclusions.

02

Our coverage is not neutral. We will never give scam infrastructure the benefit of the doubt.

03

We will never side with a scam. Not for money. Not for legal pressure. Not for any reason.

04

You should think critically. Cross-reference our findings. Check our evidence. The conclusions are always yours to draw.

Factual error? Submit a correction via our appeals process or email legal@phishdestroy.io.

Explore Our Policies