Scam Detective
Domain

tails.boum.org

First seen Feb 22, 2026

Suspicious
  • No SSL certificate
  • 28 community reports from users

Campaign Intelligence

This cluster centers on 2382 connected domains tagged as PureHVNC, elf, sh. 572 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 557 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2228 complaints with federal agencies. Geog...

This cluster centers on 2396 connected domains tagged as 156-233-71-230, Quakbot, lnk. 586 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 565 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2237 complaints with federal agen...

This cluster centers on 1895 connected domains tagged as BeaverTail, RedLineStealer, password: 2026. 113 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 934 phone numbers (8772427372, 1319641540, 1319641221) with 524 FTC complaints; 683 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2093 complaints wit...

This cluster centers on 2416 connected domains tagged as BABADEDA, WallStealer, meterpreter. 607 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (5086371451, 9366439335, 1842506726) with 570 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2243 complaints with federa...

This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...

This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...

This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...

Details

First Seen
2/22/2026

Related Domains

Community Reports

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Scambait Safety, am I overthinking it? I stumbled across [James Veitch's TED talk](https://www.youtube.com/watch?v=_QdPW8JrYzQ) some time ago, and have wanted to try this, but am worried I could somehow put myself at risk through something I didn't consider. A couple of things are I decidedly will *not* be using fake ID. I like the idea of scamming around the ID issue [like this 419eater post](https://forum.419eater.com/forum/viewtopic.php?t=206100), but will have to figure out a persona to build for it. If I have to learn to BS my way around it for a while with failed baitings, I'll just keep going until I get one. The issues I'm concerned with are my location and my computer. Do I need to go so far as to set up a virtual machine if I'm not dealing with tech support scammers? Should I do it to view attachments? I plan on using gmail's webmail service, so do I need to worry about concealing my location via TOR or some other means? I was planning on using a VM with [TAILS](https://tails.boum.org/index.en.html), which is a Linux-based TOR live-image operating system. I've been looking around and can't find much on these questions, and any input would be appreciated.

3296 days ago5 upvotes

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.

Proton Pass Unique passwords for every account

After a breach, reused passwords let attackers into your other accounts. Proton Pass generates and stores a unique password for each one.