How to Use the Scam Database
Start with the search bar below: type in keywords, phrases, or even paste suspicious text from an email or message.
Each entry is set up like a case file and includes:
Browse or search to see how these attacks operate, and use what you learn here to spot the warning signs before they catch you.
Have you seen a scam in the wild? Want to add it to the database?
Submit it here!