Free Scam Checker — Verify People, Websites, Phone Numbers, Emails, Bank Accounts & Crypto + more

Welcome to the most advanced platform for scam detection and prevention.Paste a URL, phone number, email, bank account, wallet address, or a person’s name to run a real-time check. Get results in seconds. Below, you’ll find everything you can verify and how our checks work.
Loading search widget...
We’re a platform that systematically collects and analyzes data on scams and scammers. As the first of its kind, we combine investigative work with modern technology to detect and prevent fraud. We tap into 130+ data sources, look for patterns, and link recurring schemes across cases. Anyone who’s been scammed can report their case safely — even anonymously. That helps us connect victims to one another and to existing case files faster, moving investigations forward.


We give you an easy way to vet partners, companies, websites, social profiles, phone numbers, bank accounts, and crypto wallets — before you commit to an investment, a deal, or a relationship. Join us and help make the internet a safer place.

How to Verify a Company, Person, or Domain Before You Trust

1 Step:  Search


Enter an identifier for the person or entity you want to check—such as a name, email, phone number, domain/URL, IBAN, social media handle, license plate number, etc. The more identifiers you try, the better your chances of finding a match.

Note: You can also filter by date, country, and case type, and combine these filters.
2 Step:  Results


If the system finds a match, it will show results sorted by how closely they match your query. The best matches appear at the top; similarity decreases as you scroll. We recommend reviewing several results, especially when you’re dealing with common names or incomplete data.
3 Step:  Case details & safe communication

Clicking a result opens a report with all available information we’ve collected and processed. Some sensitive fields may be blurred for legal and safety reasons. You can comment on a case and discuss it with other victims. Please maintain maximum anonymity: don’t share your real name, personal phone numbers, or any details that could identify you. Communicate only on the platform. Don’t trust anyone who asks you to move to private messages or share your phone number—reported individuals may also be monitoring the page.
Our system automatically links cases that share the same identifiers (e.g., email, name, phone number, domain). You can navigate those connections and explore related cases.

Security is in your hands.

— Scamnemesis

More information on searching in our system

1: Below you’ll find an overview of the data we process, how it’s organized, and which identifiers you can search for.

2: This page also includes a list of the most common types of fraud with brief explanations of how they work and what the attacker’s objective is, so you’ll know exactly which fraud category to choose.

ScamNemesis – Field Map & Rules

Overview of all fields in the system, their properties, and processing rules

📋 Column definitions

Required Indicates whether the field is mandatory when reporting a new case to the system.
In report Specifies whether this data appears in the generated case report.
Anonymization Some sensitive data is automatically anonymized, but you can still search it. For example, if you search for the name “John Smith,” the system will find it, but in the report it will appear as “Jo+++ +++++h.” This protects personal data while preserving search functionality.
Search Indicates which data can be searched directly and which cannot. Some fields (marked “Filter only”) can be searched exclusively via filters—typically nationalities, countries, or addresses—where you need to use a dropdown menu in the search bar.
Legend: Yes No Filter only
Field Required In report Anonymization Search Note
Type of Fraud Yes Yes PUBLIC Filter only filter in the search bar
Incident Date No Yes PUBLIC Filter only filter in the search bar
Transaction Date No Yes PUBLIC Filter only filter in the search bar
Brief Summary No Yes PUBLIC No
Detailed Description Yes Yes PUBLIC No
Financial Loss (amount, currency) No Yes PUBLIC No
Incident Location (street, city, postal code, country) No Yes PUBLIC Filter only filter in the search bar
Full name (Suspect) No Yes ANONYMOUS Yes
Nickname / alias / username (Suspect) No Yes PUBLIC Yes
Approximate age (Suspect) No Yes PUBLIC No
Nationality (Suspect) No Yes PUBLIC No filter in the search bar
Physical description (Suspect) No Yes PUBLIC No
Phone (Suspect) No Yes ANONYMOUS Yes
Email (Suspect) No Yes ANONYMOUS Yes
Address (street, city, postal code, country) (Suspect) No Yes ANONYMOUS Filter only filter in the search bar
Telegram No Yes ANONYMOUS Yes
WhatsApp No Yes ANONYMOUS Yes
Signal No Yes ANONYMOUS Yes
Instagram No Yes ANONYMOUS Yes
Facebook (name/URL) No Yes ANONYMOUS Yes
TikTok No Yes ANONYMOUS Yes
X (Twitter) No Yes ANONYMOUS Yes
Website URL No Yes PUBLIC Yes
Domain name No Yes PUBLIC Yes
Domain creation date No Yes PUBLIC No
IP address No Yes PUBLIC Yes
IP country No Yes PUBLIC Filter only filter in the search bar
ISP (provider) No Yes PUBLIC No
IP Abuse Score (0–100) No Yes PUBLIC No
IBAN No Yes PUBLIC Yes
Account holder name No Yes ANONYMOUS Yes
Account Number No Yes PUBLIC Yes
Bank Name No Yes PUBLIC Yes
Bank Country No Yes PUBLIC No
SWIFT/BIC Code No Yes PUBLIC No
Routing Number No Yes PUBLIC Yes
BSB Code No Yes PUBLIC Yes
Sort Code No Yes PUBLIC Yes
IFSC Code No Yes PUBLIC Yes
CNAPS Code No Yes PUBLIC Yes
Other Banking Details No Yes PUBLIC No
Wallet Address No Yes PUBLIC Yes
Blockchain No Yes PUBLIC No
Exchange/Wallet Name No Yes PUBLIC No
Transaction Hash No Yes PUBLIC Yes
PayPal Account No Yes ANONYMOUS Yes
Company Name No Yes PUBLIC Yes
VAT/Tax ID No Yes PUBLIC Yes
Company Address (street, city, postal code, country) No Yes PUBLIC Filter only filter in the search bar
Vehicle Make (Brand) No Yes PUBLIC No
Car Model No Yes PUBLIC Yes
Car Color No Yes PUBLIC No
License Plate No Yes PUBLIC Yes
VIN Number No Yes PUBLIC Yes
Registered Owner No Yes ANONYMOUS No
Payment Evidence No Yes ANONYMOUS Media Photos, documents, etc.
Fraudster Photos No Yes ANONYMOUS Media Photos, documents, etc.
Screenshots No Yes ANONYMOUS Media Photos, documents, etc.
Damage Documentation No Yes ANONYMOUS Media Photos, documents, etc.
Crime Scene Photos No Yes ANONYMOUS Media Photos, documents, etc.
Other Evidence No Yes ANONYMOUS Media Photos, documents, etc.
Victim Name Yes No ANONYMOUS No
Victim Email Address Yes No ANONYMOUS No
Victim Phone Number No No ANONYMOUS No
Victim Additional Information No No ANONYMOUS No

Most Common Types of Scams

Here you’ll find a list of the most common scams with brief explanations of how they work—so you can categorize cases and search more easily.

🎣 Phishing & Social Engineering

Phishing

phishing

Deceptive emails or messages impersonating trusted brands to steal passwords and sensitive data. The most common online fraud globally.

Vishing

vishing

Phone-based social engineering. Callers pose as bank staff, police, or IT support to pressure you into revealing credentials or approving payments.

Smishing

smishing

Fraudulent SMS with links to fake login pages. Often spoof courier services, banks, or government offices to harvest one-time codes.

Romance Scam

romance_scam

Criminals build trust through fake online relationships and then request money for fabricated emergencies. Typical losses reach tens of thousands.

Identity Spoofing

identity_spoofing

Attackers impersonate celebrities, executives, or your contacts on social media to solicit money or push malicious links.

💰 Investment & Online Financial Fraud

Crypto Investment Scam

crypto_investment

Fake platforms promise guaranteed returns. Once funds are deposited, access is blocked and “profits” are fabricated.

Forex/Stocks Fraud

forex_stock

Unlicensed brokers and “advisors” lure victims into high-risk trading. Gains are fictitious; withdrawals are blocked.

Ponzi Scheme

ponzi_scheme

Older investors are paid with funds from new ones. The scheme collapses when inflows slow down.

Pyramid Scheme

pyramid_scheme

Illegal models where revenue depends on recruiting members, not selling real products. Most participants lose money.

💻 Malware & Technical Scams

Malware Fraud

malware

Malicious apps and attachments steal data, track activity, or enable remote access without your consent.

Scareware / Ransomware

ransomware

Ransomware encrypts files and demands payment. Scareware pushes fake virus alerts to sell useless software.

Tech Support Scam

tech_support

Fake “technicians” pressure you to grant remote access or pay for fixing non-existent problems.

Deepfake Fraud

deepfake

AI-generated audio/video convincingly imitates real people to endorse scams or manipulate decisions.

🏦 Banking & Financial Crime

Credit Card Fraud

credit_card_fraud

Unauthorized online purchases or cash withdrawals using stolen card details or compromised merchants.

Identity Theft

identity_theft

Criminals use your personal data to open accounts, take loans, or commit crimes in your name.

Loan Scam

loan_scam

“Guaranteed” loans that demand upfront fees. After payment, the lender disappears and no loan is issued.

Grant/ Subsidy Scam

grant_scam

Fraudsters promise “government grants” if you pay administrative fees. Real grants never require advance payments.

🛒 Online Sales & Purchase Fraud

Online Purchase Scam

online_purchase

You pay for goods that never arrive, or receive items far below the advertised quality—typically on unverified shops.

Fake E-shop

fake_eshop

Professional-looking websites mimic well-known brands and offer extreme discounts, then disappear after taking payment.

Counterfeit / Low-Quality Goods

fake_goods

Knock-offs or goods drastically worse than advertised, often sold via marketplaces or unregulated shops.

Marketplace Fraud

online_marketplace

Scammers post non-existent items, ask for deposits, or send fake payment links. Prefer in-person verified exchanges.

💼 Employment & Service-Related Fraud

Job Offer Scam

job_offer

“Dream job” offers require upfront training fees or harvest personal data via fake applications.

Fake Invoices

fake_invoice

Invoices for services never ordered, often targeting SMEs and freelancers to slip into routine payments.

Wage Non-Payment

wage_nonpayment

Employers exploit trial work or projects, then avoid paying. Keep contracts and evidence of work delivered.

🔐 Online Accounts & Identity

Account Verification Scam

account_verification

Fake “Facebook/Instagram” messages urge you to log in to “verify” your account and steal credentials.

SIM Swap

sim_swap

Attackers transfer your number to their SIM to intercept 2FA codes and hijack accounts.