PhishDestroy

ScamIntelLogs

Threat Intelligence & Scam Research Archive

Open-source repository of leaked data from criminal scam networks. Telegram chats, admin panels, victim databases, theft records, payment flows, and infrastructure documentation.

Telegram Chats Admin Panels Victim Records Phishing Designs Payment Flows Scammer Lists IOCs

Select a Team

Click on a team name to view intelligence data and available archives.

Our Mission

Protect Victims

We expose criminal networks so that potential victims can recognize fraud patterns before losing their money. Prevention through awareness.

Aid Investigations

Structured intelligence for law enforcement, security researchers, and journalists investigating organized cybercrime and financial fraud.

Expose & Deter

Scammers operate in the dark. We bring their infrastructure, methods, identities, and communications into the light. Transparency is deterrence.

Why this exists

Most scammers are kids. Their code is sloppy, their Telegram chats are full of typos, their panels have broken English mixed with Russian. There's nothing sophisticated here — don't look for elegant exploits or clever schemes. It's messy, it's dumb, and it hurts real people.

Scammers are paranoid by nature. They delete chats, rotate domains, burn accounts, wipe traces. They operate on the assumption that if nothing is left behind, nothing can be proven. We make sure something is left behind.

This archive preserves what they try to destroy: chat logs, panel screenshots, code, configs, domain lists, Telegram profiles, payment flows. All of it saved, structured, and published — so that victims can identify who scammed them, investigators can analyze the texts, code, and infrastructure, and researchers can understand how these operations actually work.

Not the marketing version — the reality: cheap panels, stolen registrations, broken promises to their own affiliates.

⚠️

Disclaimer

This archive exists to combat and expose criminal scam operations. We do not endorse, encourage, or provide instructions for fraud. Scamming destroys lives — it is a crime with real victims.

All data is published for legitimate purposes: law enforcement investigations, security research, journalism, victim identification, and fraud prevention. Using this data to replicate or facilitate criminal activity is prohibited and may be a criminal offense in your jurisdiction.

Participants in documented networks face criminal prosecution, asset seizure, and imprisonment. International law enforcement increasingly cooperates on cryptocurrency fraud — there is no safe haven.

PhishDestroy provides this data "as is" without warranty. We are not responsible for how third parties use the information. By accessing this archive you agree to use it only for lawful purposes.

MIT License

Open Source Under MIT License

This project is free and open-source software. You are free to use, copy, modify, and distribute the data and tools for any lawful purpose, including:

Security research & publications
Law enforcement operations
Investigative journalism
Fraud prevention & awareness
Victim support & recovery
Building anti-fraud tools

Full license text: github.com/phishdestroy/ScamIntelLogs/LICENSE

0
Teams Exposed
0
Evidence Files
0
Panels Detected
0%
Open Source