Story • 6–9 min read

Scammers Are Mad: $0 Takedowns, Priceless Tantrums

Since 2019, our site started as a joke (“you don’t even have a website!” — scammers to a registrar). We built one in 15 minutes. The joke stuck — the takedowns scaled. We remove phishing domains & infra, preserve evidence for investigators, and avoid doxxing. When abusers get cocky and cross the line, we escalate and pass identities to authorities. They burn thousands. We spend $0. We laugh.

Ironic hero art about scammers getting mad

How We Operate

  • Primary goal: remove phishing links & infrastructure fast.
  • Evidence first: we snapshot sites (incl. Web Archive) before takedown to avoid harming investigations.
  • No doxx by default: we don’t touch “the person” unless their escalation forces legal reporting.
  • $0 model: automation + one SMTP report containing everything a registrar/host needs.
TERMINATED — This label appears on cards that mirror real scam patterns. The red “SCAM” glitch ribbon is satire, not a service ad.

Why Scammers Fail (and Pay)

  • Bulk inbox floods (2–5k msgs/day for months). We don’t wait for replies — no impact.
  • Paper company stunts in the U.K. + forged “ownership” docs. Domain on a private person — claims fail.
  • Braggy “law-enforcement style” social takedowns — irrelevant to infra removals.
  • Illegal content swaps to trigger auto-bans — we don’t auto-post third-party content.
  • Fake followers/likes/reports from bot farms — reported and wiped.
  • DDoS attacks: expensive, pointless — email flows continue; the lander is optional.

Incidents (Screens & Pop-ups)

“Hacker panel” — visual parody

Not a product. Just an image to mock their UX obsession over crime dashboards.

Forum Pricing - Their “gov access”

Pricing from public scam forums. Education only. They even do a turnkey service and have access to automated law enforcement dashboards.gov as normal.

Fake “Russian hacker” forums — marketing stolen clout

Scammers make faux-RU boards and parade our work as their “service”. Screenshot preserved.

Fake Russian hacker forum screenshot
Click to open full-size. Purpose: documentation only.

DDoS attempts — costly, irrelevant

They rent botnets to “drop” us. Email/takedowns unaffected; lander optional.

DDoS attack graph/screenshot
Click to open full-size. Traffic spikes ≠ operational impact.

False report example — hosting confusion

[33/Nov/2024:11:42:56 +0000] "POST /oji.php?svs HTTP/1.1" 403 192 "https://mysite.com"
"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" "mysite.com"

They hid the real domain as mysite.com in a report. It wasn’t DDoS but their seed-capture auth. Lessons were learned.

Social Media Takedowns & Archives

Our social accounts are often mass-reported. The CarlyGriggs13 X account was a ~$0.30 handle we used to auto-post ~140k takedowns for indexing. Our Medium blog faced a similar fate. Both were suspended. Here are the archives:

X (Twitter) Archive

GitHub Repo

Medium Blog Archive

View Archive

Evidence Preservation

  • We store pages on public archives before takedown to keep the best possible evidence trail.
  • When identity is clear and escalation is harmful, we pass to authorities — by the book.
  • We prefer automation and infra removal to person-centric hunts.
Related read: https://www.infosecurity-magazine.com/news/law-enforcement-government-emails/
Registrar responses vary. Namecheap consistently acts fast; others... less so.

$0 Policy, Real Impact

  • Automation kills portfolios faster than “PR wars”.
  • They spend on companies, bots, “legal” faxes, fake claims, and DDoS noise. We still remove their infra.
  • Illegal threats ⇒ we escalate to law enforcement.

Want to Help?

Closing

We warn them: “your infra turns off soon” — chaos begins. Meanwhile we keep it boring: scan, archive, report, remove. $0 spent. Impact compounding.

#OSINT #PhishingTakedown #Automation #Evidence #ZeroBudget