GitHunt
PH

phishdestroy/ScamIntelLogs

Open-source intelligence archive of crypto scam operations โ€” internal chats, admin panels, victim records, and infrastructure data for research and investigation

ScamIntelLogs

ScamIntelLogs Banner

Open-Source Scammer Intelligence Archive

Internal data, chat logs, admin panels, and infrastructure from criminal scam networks

GitHub Stars
GitHub Forks
License
Website


๐Ÿ“‚ Browse Archive โ€ข
๐Ÿค– Report Scammers โ€ข
๐Ÿฆ Twitter โ€ข
๐ŸŒ Website


๐Ÿ“‹ Overview

ScamIntelLogs is a public intelligence archive containing leaked, dumped, and collected data from cryptocurrency scam operations. This repository preserves evidence that scammers typically delete to evade accountability.

What's Inside

Data Type Description
๐Ÿ’ฌ Internal Chats Telegram group conversations, private messages, operational discussions
๐ŸŽ›๏ธ Admin Panels Screenshots, configs, and audits of scam infrastructure
๐Ÿ‘ฅ Scammer Identities Telegram IDs, usernames, wallet addresses, known aliases
๐Ÿ’ฐ Theft Records Victim wallets, stolen amounts, transaction hashes
๐ŸŽจ Phishing Assets Design templates, clone sites, drainer configs
๐Ÿ“Š Financial Flows Payment records, affiliate payouts, laundering paths
๐ŸŒ Infrastructure Domains, hosting providers, bot tokens, API endpoints

โš–๏ธ Methodology

We do NOT hack, attack, bruteforce, or compromise any systems.

All data is collected through passive intelligence gathering:

  • ๐Ÿ” OSINT โ€” Open-source intelligence from public sources
  • ๐Ÿ“ฅ Leaked Data โ€” Community-submitted dumps from insiders
  • ๐Ÿ•ต๏ธ Social Engineering Artifacts โ€” Data exposed by scammers themselves
  • ๐Ÿ“ก Passive Monitoring โ€” Public channels, forums, blockchain analysis
  • ๐ŸŽ Voluntary Submissions โ€” Victims and researchers sharing evidence

When admin panel access is obtained (through leaks or misconfiguration), we conduct non-destructive audits to document infrastructure without modification.


๐ŸŽฏ Purpose

Who Benefits

Audience Use Case
๐Ÿ”ฌ Security Researchers Study scam TTPs, drainer mechanics, social engineering
๐Ÿ‘ฎ Law Enforcement Evidence for investigations and prosecutions
๐Ÿ“ฐ Journalists Exposรฉs on organized crypto fraud
โš–๏ธ Victims Identify attackers, support recovery efforts
๐Ÿ›ก๏ธ Threat Intel Teams IOCs, infrastructure patterns, actor tracking

Why Archive This

Scammers systematically destroy evidence โ€” deleting Telegram chats, burning wallets, rotating domains. This archive ensures:

  • Permanent Record โ€” Evidence survives deletion attempts
  • Pattern Analysis โ€” Cross-reference actors across operations
  • Accountability โ€” Public exposure deters future activity
  • Community Defense โ€” Shared knowledge protects potential victims

๐Ÿ“‚ Repository Structure

Each scam operation gets its own directory. Inside, evidence is organized by type:

TeamName/
โ”œโ”€โ”€ chat/              # Internal Telegram group conversations
โ”œโ”€โ”€ channel/           # Public channel announcements
โ”œโ”€โ”€ successful_thefts/ # Confirmed theft records (wallets, tx hashes, amounts)
โ”œโ”€โ”€ designs/           # Phishing page templates and clone assets
โ”œโ”€โ”€ payments/          # Payment logs, affiliate payouts
โ”œโ”€โ”€ scammers_login.txt # Known participant Telegram IDs and usernames
โ”œโ”€โ”€ domains.txt        # Associated phishing domains
โ”œโ”€โ”€ iocs.json          # Machine-readable indicators of compromise
โ””โ”€โ”€ index.html         # Visual evidence browser for this team

Not every team has all folders โ€” it depends on what evidence was collected. The root index.html lists all archived operations with descriptions and direct links to every subfolder.

Browse the full archive


This archive is part of the PhishDestroy threat intelligence ecosystem:

Project Description
destroylist 70,000+ malicious domains blocklist
PhishDestroy Bot Telegram bot for scam reporting
phishdestroy.io Main project website

๐Ÿค Contributing

We accept submissions of scam-related intelligence:

What We Accept

  • Telegram chat exports (JSON/HTML)
  • Admin panel screenshots/configs
  • Scammer identity information
  • Domain/infrastructure data
  • Wallet addresses and transaction evidence

How to Submit

Option 1: Pull Request

git clone https://github.com/phishdestroy/ScamIntelLogs.git
# Add data to new directory: NewTeamName/
git commit -m "Add NewTeamName data"
# Submit PR

Option 2: Anonymous Submission

Submission Guidelines

  • Remove personal victim data (redact if necessary)
  • Include context: team name, operation type, timeframe
  • Provide source attribution if comfortable
  • Structure data in readable format

โš ๏ธ Disclaimer

  • This repository contains evidence of criminal activity for research purposes
  • Data is provided "as-is" without verification guarantees
  • Do not use this data for harassment, vigilante justice, or illegal purposes
  • Victim PII should be handled responsibly
  • We are not responsible for misuse of this information

๐Ÿ“œ License

MIT License โ€” Free to use, clone, modify, and distribute.

Law enforcement agencies are explicitly authorized to use this data for investigations.


๐Ÿ›ก๏ธ Fighting Fraud Through Transparency

Scammers delete evidence. We preserve it.


Twitter Follow
GitHub


"The community must know its scammers."

phishdestroy/ScamIntelLogs | GitHunt