This scam campaign involves a network of 6 phone numbers operating in coordination with debt collection activities, centering around Credit Corp Solutions Inc., which has received 2,743 consumer complaints filed with the Consumer Financial Protection Bureau. The phone numbers in this network include 833-382-7312, 229-213-0351, 844-630-1735, 844-693-0615, 888-788-4779, and 877-899-1809. Despite the extensive complaint history associated with Credit Corp Solutions Inc., none of these phone numbers...
844-630-1735
Last reported Apr 22, 2026
- 9 community reports from users
Campaign Intelligence
This cluster centers on 2451 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include cdn.discordapp.com, 91.92.241.152, 91.92.240.222, 158.94.208.174, 178.16.52.44, 158.94.211.102, 158.94.210.93, 158.94.208.52, i.postimg.cc, s3.us-east-2.amazonaws.com, storage.googleapis.com, 178.16.52.18, 158.94.211.101, 158.94.211.100, local-host.life, dropmefiles.com, limewire.com, 62.60.226.159, id8965.com, valfanto.com and 2431 more. 633 of these domains have been flagged by threat int...
This cluster centers on 1486 connected domains tagged as AgentTesla, None, js. The domains include i.postimg.cc, cdn.discordapp.com, s3.us-east-2.amazonaws.com, pastes.io, dl.dropboxusercontent.com, ltcexchange.bitparking.com, bitcoin.sipa.be, litecoinpool.org, cryptocoincharts.com, sigaintevyh2rzvw.onion, toremail.net, lelantos.org, www.sigaint.org, epjhlyfgxenf2q4o.onion~~, inocncymyac2mufx.onion, torbox3uiot6wchz.onion, 344c6kbnjnljjzlz.onion, mailtor.net, bscscan.com, securitized.io and 1466...
This cluster centers on 2957 connected domains tagged as GuLoader, NorthKorea, censys. The domains include salelegalsteroids.com, 192.210.186.208, gharnt.com, cloflart.com, id3702579photo-image-docs.com, www.almacensantangel.com, 64.95.12.162, blue-oceans.net, sixmexicos.com, baritonclick.online, 185.252.24.15, un1rw11q4u.com, ameyiando.com, niril.sbs, bursaelektriktamir.com, blankeyeo.com, umxtxhub.za.com, sunchernical.com, 18.194.67.137, servecdn.my and 2937 more. 606 of these domains have bee...
This cluster centers on 2559 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include 83.224.148.34, 14.236.247.68, 120.157.72.59, 95.127.248.192, 116.110.179.199, 116.101.73.68, 95.127.250.241, 152.173.199.182, 91.80.129.100, 59.88.45.188, 117.216.5.20, 182.60.11.164, 41.146.14.165, 120.157.46.38, 59.182.90.199, 113.168.249.76, 78.132.114.25, 171.241.208.124, 120.157.229.220, 14.236.84.25 and 2539 more. 640 of these domains have been flagged by threat intelligence feeds inc...
Our analysis has identified a coordinated campaign involving three phone numbers—8446301735, 9805174077, and 8883429218—all linked to Account Services Inc., a debt collection company that has received 8 complaints with the Consumer Financial Protection Bureau (CFPB). Despite having no formal FTC complaints logged against the individual phone numbers, community reports reveal concerning fraudulent activities associated with this network. The phone numbers demonstrate strong campaign connections w...
Details
Linked Company Activity
Connected Entities
Linked Companies
PENTAGON FEDERAL CREDIT UNION
campaign co-membercompanyFIFTH THIRD FINANCIAL CORPORATION
campaign co-membercompanyCredit Services Corporation, LLC
campaign co-membercompanyIntegrity Group Inc
campaign co-membercompanyDirect, Inc
campaign co-membercompanyThe Bureaus, Inc.
campaign co-membercompanyEVERBANK, NATIONAL ASSOCIATION
campaign co-membercompanyTime Investment Corporation
campaign co-membercompanyCheckr, Inc
campaign co-membercompanyMOUNTAIN AMERICA FEDERAL CREDIT UNION
campaign co-membercompanyFuture Financial Inc.
campaign co-membercompanyReady Capital Corporation
campaign co-memberRelated Phone Numbers
8553572202
campaign co-memberphone3186669555
campaign co-memberphone8667715844
campaign co-memberphone8339086865
campaign co-memberphone8009220204
campaign co-memberphone4097617631
campaign co-memberphone6789998212
campaign co-memberphone6512042449
campaign co-memberphone5187704680
campaign co-memberphone8887291403
campaign co-memberphone8889194623
campaign co-memberphone9805107108
campaign co-memberphone7712473445
campaign co-memberphone5858247925
campaign co-memberphone8009993355
campaign co-memberphone8007715361
campaign co-memberphone8009033637
campaign co-memberphone8884260179
campaign co-memberphone2025582508
campaign co-memberphone9297499563
campaign co-memberphone3025417253
campaign co-memberphone8887910954
campaign co-memberphone8334471291
campaign co-memberphone7656119812
campaign co-memberRelated Domains
130.12.180.43
campaign co-memberdomainimplementing-theft-metal-justin.trycloudflare.com
campaign co-memberdomainstaying-heavily-meaning-blowing.trycloudflare.com
campaign co-memberdomaincreations-venture-traditional-stainless.trycloudflare.com
campaign co-memberdomain103.125.219.204
campaign co-memberdomain206.123.145.26
campaign co-memberdomainarilprivate.storexyz.web.id
campaign co-memberdomain14.236.182.73
campaign co-memberdomain83.224.162.132
campaign co-memberdomain123.31.81.229
campaign co-memberdomain120.157.56.105
campaign co-memberdomain113.176.132.141
campaign co-memberRelated Emails
diana@ierek.com
campaign co-memberemailcfjtfl@verxl.com
campaign co-memberemailcbx-df@ceszx.com
campaign co-memberemailj.thompson8822@ymail.com
campaign co-memberemailbb.adige@libero.it
campaign co-memberemailhr@teknfix.com
campaign co-memberemailpangmyiuhk@yahoo.co.jp
campaign co-memberemailmarydavis09@zoho.com
campaign co-memberemailidentity@varomoney.com
campaign co-memberemailservicename@nickname.tld
campaign co-memberemailxxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grupoaldama.com.mx
campaign co-memberemaila4084163@trbvm.com
campaign co-memberCommunity Reports
I gotten an alert from cash app a transaction was declined 2 times for $120.03 from guidetoinfoproductsebookh 8446301735PAYRECOVER 4816 and there is another one that has the same word bookh at the end of the fake name [BBB Scam Type: Identity Theft] [Business: Guidetoinfoproductsebookh Date Repor] [Location: OR, USA - 97220]
I dont know where they got my debit card or how they was able to use it bc im very careful bc ive had to replace two other debit cards already but i woke up to a random charge of 39.95 the transaction number just says 8446301735payrec and i dont know where that is or what it is or how its coming from my account Dollars Lost $39.95 [BBB Scam Type: Other] [Business: Payrec] [Location: OH, USA - 45344]
March 16, 2026: 1-844-630-1735 is the phone number from PAYRECOVER 4 JOLIET EL $14.95 USD$ @ 1.408260870 = $21.05 CDN$ charged on my CDN Tire Mastercard. I did report this transaction to the Cdn Tire Mastercard on March 16, 2026, in the afternoon. My card was cancelled immediately, and I'm awaiting the replacement card, which I was informed would take approx 10 business days to receive the new card. Thank you. Dollars Lost [BBB Scam Type: Credit Cards] [Business: Payrecover 4 Joliet] [Location: ON, CAN- L9A 4M5]
$19.75 was charged on my credit card and it came back as 8446301735payrecovery. Dollars Lost $19.75 Targeted [BBB Scam Type: Identity Theft] [Business: Pay recovery] [Location: TN, USA- 38063]
I had several non-descript payments I didn't recognize on my CHILD SUPPORT CARD. It was labeled as Pay Recovery. The number is 1-844-630-1735. When I called I found out that it is a scam. I was charged for things in different parts of the world. And once they found out it was a child support card from the state they said they would stop because they said they didn't want to get in trouble. Dollars Lost [BBB Scam Type: Identity Theft] [Business: Pay Recovery] [Location: MI, USA- 48750]
I had an unknown charge from 8446301735payrecover5 to my paypal in the amount of $14.95 on Jan 30th 2026 at 2:49am. I dont know how they got my info or for what this charge was made. I tried calling the company at 8446301735 and the person that answered acted as though they couldnt hear me and hung up. Dollars Lost $14.95 [BBB Scam Type: Phishing] [Business: Payrecover5] [Location: CA, USA- 95050]
An unauthorized debit was taken from my account in the amount of $49.20 the transaction was listed as 8446301735PAYRECOVER 5 JOLIETILUS Dollars Lost $49.2 [BBB Scam Type: Online Purchase] [Business: Jolietilus8446301735payrecover5 Date] [Location: ON, CAN- L0E 1N0]
I got a text fraud alert from my bank that a charge was made for $14.95 from 8446301735 PayRe is all the info I got. I denied the charge and my account was immediately closed. So now I have the headache of having to get a new card number and have any auto payments changed. Scammers need to get a REAL job and leave everyone alone already. With all the new technology you would think the scammers would get caught FASTER! [BBB Scam Type: Online Purchase] [Business: PayRe] [Location: MI, USA- 49735]
8446301735PAYRECOVER tried to bill my American Express card for $14.95. American Express saw it in time, denied the charge, and asked me to verify it which saved me a lot of hassle. I have never heard of this company and have no idea why they are billing me. They have never contacted my with any kind of invoice nor have I recently bought anything for $14.95. Always, when I charge something I use a credit card directly and not some sort of payment service. I lost no money but because my account was compromised I have to wait for a new credit card with new number to arrive. Could have been much worse. [BBB Scam Type: Identity Theft] [Business: PAYRECOVER] [Location: MD, USA- 21042]
Share Your Experience
What's Your Exposure?
Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.