The CybersecuriTea Scam Database

A searchable library of real world scams.

How to Use the Scam Database

Start with the search bar below: type in keywords, phrases, or even paste suspicious text from an email or message.

Each entry is set up like a case file and includes:

  • Category (where the scam shows up, like text or email)
  • Type (the flavor of scam—phishing, fake jobs, etc.)
  • Content (the exact wording attackers use)
  • How it works (what the attacker is trying to pull off)
  • What to do (the safe next step, like ignoring, deleting, or checking your account directly)

Browse or search to see how these attacks operate, and use what you learn here to spot the warning signs before they catch you.