Select a Team
Click on a team name to view intelligence data and available archives.
Threat Intelligence & Scam Research Archive
Open-source repository of leaked data from criminal scam networks. Telegram chats, admin panels, victim databases, theft records, payment flows, and infrastructure documentation.
Click on a team name to view intelligence data and available archives.
We expose criminal networks so that potential victims can recognize fraud patterns before losing their money. Prevention through awareness.
Structured intelligence for law enforcement, security researchers, and journalists investigating organized cybercrime and financial fraud.
Scammers operate in the dark. We bring their infrastructure, methods, identities, and communications into the light. Transparency is deterrence.
Most scammers are kids. Their code is sloppy, their Telegram chats are full of typos, their panels have broken English mixed with Russian. There's nothing sophisticated here — don't look for elegant exploits or clever schemes. It's messy, it's dumb, and it hurts real people.
Scammers are paranoid by nature. They delete chats, rotate domains, burn accounts, wipe traces. They operate on the assumption that if nothing is left behind, nothing can be proven. We make sure something is left behind.
This archive preserves what they try to destroy: chat logs, panel screenshots, code, configs, domain lists, Telegram profiles, payment flows. All of it saved, structured, and published — so that victims can identify who scammed them, investigators can analyze the texts, code, and infrastructure, and researchers can understand how these operations actually work.
Not the marketing version — the reality: cheap panels, stolen registrations, broken promises to their own affiliates.
This archive exists to combat and expose criminal scam operations. We do not endorse, encourage, or provide instructions for fraud. Scamming destroys lives — it is a crime with real victims.
All data is published for legitimate purposes: law enforcement investigations, security research, journalism, victim identification, and fraud prevention. Using this data to replicate or facilitate criminal activity is prohibited and may be a criminal offense in your jurisdiction.
Participants in documented networks face criminal prosecution, asset seizure, and imprisonment. International law enforcement increasingly cooperates on cryptocurrency fraud — there is no safe haven.
PhishDestroy provides this data "as is" without warranty. We are not responsible for how third parties use the information. By accessing this archive you agree to use it only for lawful purposes.
This project is free and open-source software. You are free to use, copy, modify, and distribute the data and tools for any lawful purpose, including:
Full license text: github.com/phishdestroy/ScamIntelLogs/LICENSE