PhishDestroy Live
Back to News
Methodology

Seed Flooding: Why PhishDestroy Openly
“Attacks” Phishing Sites

We don’t hide it. When PhishDestroy detects an active phishing site harvesting crypto wallet seed phrases, we flood it with valid-format seed phrase entries. Here’s exactly what we do, why we do it, and why we’re not ashamed of it.

March 31, 2026 PhishDestroy Research 12 min read
Seed flooding — counter-phishing digital battlefield
Counter-phishing operations: when reporting alone isn’t fast enough, we act directly
14,663CF Workers
2/10sRate Limit
5+Exfil Channels
$0Attacker Cost
<4hTo Exhaust EmailJS

The Problem: A Phishing Site Is Live Right Now

Imagine you spot a crypto wallet phishing page running paid Google Ads. It looks legitimate. It’s got traffic. Real users are landing on it every few minutes, entering their seed phrases, and losing everything.

You report it to Google. You report it to the registrar. You submit an abuse report to the hosting provider. And then you wait.

Meanwhile, the scammer collects victim number 47. Then 48. Then 49.

The Bureaucratic Gap

The standard abuse reporting pipeline operates on timescales of 5–10 business days. Active phishing sites cause irreversible financial damage in hours. This gap is not a bug in the system — it’s a structural vulnerability scammers exploit deliberately.

Bureaucratic reporting pipeline vs active phishing collecting victims
Left: the slow abuse reporting pipeline. Right: the scammer collecting while you wait.

What Is Seed Flooding?

Seed flooding is a counter-phishing technique where valid-format but empty/worthless cryptocurrency wallet seed phrases are automatically submitted into a phishing form at a controlled rate.

Contaminate the Database
Real seed phrases become indistinguishable from fakes. Every entry requires manual verification, collapsing the signal-to-noise ratio.
Exhaust Free-Tier Limits
EmailJS, Formspree, Web3Forms — all have hard monthly quotas. We hit those limits in hours, severing the attacker’s notification pipeline.
Break the Collection Pipeline
When exfiltration channels stop functioning, real victims’ data goes nowhere — even if they submit their seed phrase.
Generate Research Intel
Flooding reveals infrastructure details, error messages, and rate-limit thresholds we use to build better detection.
Phishing form being flooded with fake seed phrases
A phishing form receiving a flood of fake seed phrase submissions — the attacker’s data collection degrades in real time

Why This Works: The Anatomy of a Cheap Phishing Kit

The vast majority of active crypto phishing sites are copy-paste kits built on free-tier third-party services. This is their biggest vulnerability. For a deeper breakdown see our full investigation.

Anatomy of a phishing kit — free-tier service dependencies
Every exfiltration channel is a free-tier service with hard submission limits — the kit’s cheapness is its fatal flaw
ModuleFree Tier LimitEffect of Flooding
EmailJS~200 submissions/monthExhausted in hours, stops email delivery
Formspree50 submissions/monthDisabled almost immediately
Web3Forms250 submissions/monthRapidly neutralized
Telegram Bot APIRate-limited per secondFlooded into timeout loops
Firebase Free TierRead/write quotasDatabase costs spike or lock out
Observed Result

We have directly observed phishing infrastructure go dark after seed flooding exhausted its notification pipeline. The scammer doesn’t know why it stopped working. They just stop receiving data.

Our Technical Approach: Cloudflare Workers, Not Botnets

Cloudflare edge network used for counter-phishing
14,663 Cloudflare Workers operating at the edge network layer — zero third-party infrastructure involved

We use Cloudflare Workers. Requests originate from Cloudflare’s own edge network. No residential IPs misused. No botnets. No third-party servers burdened. Only the scammer’s data collection system is affected.

The Flooding Flow

Site DetectedActive traffic confirmed
Anatomy AnalysisExfil channels mapped
Worker DeployCF edge network
2 Seeds / 10sControlled rate
Quota ExhaustedAttacker blind
Reporting FiledParallel track

Rate limiting: A strict 2 submissions per 10 seconds. Not a DDoS. A slow, deliberate, targeted contamination at a scale that makes even modest per-site rates meaningful across dozens of simultaneous targets.

What We Are Not Doing

We are not trying to take down servers. We are making the scammer’s workday miserable and their database worthless — with zero collateral impact on legitimate infrastructure.

“But Is It Legal? Is It Ethical?”

A phishing trap pit being filled with rocks
The scammer built a trap. We are filling it with rocks.

Submitting data to a public-facing web form — even fake data — is not inherently illegal in most frameworks. We are not accessing private systems, exploiting unauthorized vulnerabilities, or intercepting communications. The scammer built a trap. We are filling it with rocks.

Legal Disclaimer

PhishDestroy is not providing legal advice. This exists in a genuine gray area that varies by jurisdiction. We operate with full awareness of this complexity.

A scammer running a phishing page has no legitimate interest in receiving only real seed phrases. They have no right to the integrity of their criminal data collection infrastructure.
Our system is targeted, rate-limited, and tied to manual identification processes. We identify, analyze, confirm, and then act.
We have documented cases where seed flooding directly prevented victims from losing funds — because by the time a real user submitted their seed phrase, the scammer’s collection system was already disabled.

What Happens to the Scammer’s Database?

It becomes useless — thousands of entries require manual verification, signal-to-noise ratio collapses. Or it breaks — Firebase Spark and shared MongoDB instances have hard limits. Hitting them has consequences.

Both Outcomes Are Good

Whether the database becomes useless or breaks entirely — real victims’ seed phrases never reach the attacker in a useful form. Every unprocessed seed phrase is a wallet that doesn’t get drained.

When Do We Activate Seed Flooding?

CriterionCheckWhy It Matters
Active traffic confirmedRequiredAd platforms or traffic tools confirm real users are landing on the site
Phishing anatomy analyzedRequiredFree-tier exfil modules identified before we flood
Abuse reports filedRequiredWe always pursue the legitimate track simultaneously
No takedown within SLATypical triggerNo response from registrar/hosting in acceptable time
High-volume / paid ads siteImmediate triggerPaid advertising means we act without waiting for the bureaucratic track

The Bigger Picture

The crypto ecosystem loses billions of dollars per year to phishing. The defense side has historically been reactive. PhishDestroy exists to introduce proactive interference into this cycle.

Transparency Is Core to What We Do

We are not operating in darkness. We publish our methodology. We explain our techniques. We document the phishing kits we analyze. The security community deserves to evaluate counter-phishing methods, not just consume a black-box service.

PhishDestroy — finding and neutralizing phishing infrastructure
The scammers are organized. Their tools are standardized. That means counter-tools can be standardized too.

What You Can Do

If you think feeding empty wallets to criminals is unethical — that’s your position, and you’re welcome to hold it. We’ve made ours clear.