Scam Detective
Phone Number

857-283-6909

Last reported Mar 20, 2026

Low Activity
  • 1 community report from users

Campaign Intelligence

This cluster centers on 2957 connected domains tagged as GuLoader, NorthKorea, censys. The domains include salelegalsteroids.com, 192.210.186.208, gharnt.com, cloflart.com, id3702579photo-image-docs.com, www.almacensantangel.com, 64.95.12.162, blue-oceans.net, sixmexicos.com, baritonclick.online, 185.252.24.15, un1rw11q4u.com, ameyiando.com, niril.sbs, bursaelektriktamir.com, blankeyeo.com, umxtxhub.za.com, sunchernical.com, 18.194.67.137, servecdn.my and 2937 more. 606 of these domains have bee...

Details

First Seen
3/20/2026
Last Reported
3/20/2026
Area Code
857

Linked Company Activity

EQUIFAX, INC.
1 BBB complaint · Credit Cards] [Business: Equifax Impersonator] [Location: MD, USA- 21207]
TRANSUNION INTERMEDIATE HOLDINGS, INC.
4 BBB complaints · Phishing] [Business: TransUnion Imposter Sc
JPMORGAN CHASE & CO.
16 BBB complaints
CITIBANK, N.A.
23 BBB complaints
WELLS FARGO & COMPANY
204 BBB complaints · Bank/Credit Card C
AMERICAN EXPRESS COMPANY
105 BBB complaints
PNC Bank N.A.
22 BBB complaints

Connected Entities

Community Reports

They created an elaborate operation with fake websites (animalz-tech.com, animalz-pro.com, etc.), professional "customer service" support, and a WhatsApp group of 25+ members sharing fake success stories. I was told to complete "tasks" that would earn commissions, but they systematically trapped me with "combination tasks" - scenarios requiring larger deposits to "unlock" my previous payments. The financial demands escalated relentlessly: $30 "reset fee," $108 for MetaMask setup, then wire transfers of $100, $1,700, $4,000, $9,500, and then was asked for $30,000 to complete my $60k income task. My total losses exceed $15,000. They finally demanded $30,000 for the "last combination task" promising $60,000 return. Every time I would respond to my "mentor" the Customer Service team would reach out stating I may lose/get my account "frozen" to pay the merchant. They coached me through cryptocurrency purchases and wire transfers using multiple wallets across different platforms. I have complete documentation of everything along with all chat messages, phone #'s and names "used". (ETH: 0x5e316f85e81aDE5f5533EBC9574f942db6e6B00f, SOL: CdTBSbps2LPrdmnbaBSFEPVGpiwkPNVHsVS45Nj7HXSG, BNB: 0x7809766Cc3B7CB83BE60acD77EC308174CDCEa62). The sophistication suggests organized international crime with professional infrastructure designed to systematically extract maximum funds from vulnerable people. Please investigate immediately as cryptocurrency assets may still be recoverable and other elderly victims need protection FRAUDULENT WEBSITES (Sequential Domain Migration): www.animalz-tech.com https://animalz-romote.com/ https://animalz-pro.com/ animalz-shopping.com PHONE NUMBERS USED: Initial SMS recruitment: +1 (857) 283-6909 ("Icelynn") Primary scammer: +1 (920) 548-0044 ("Ha [BBB Scam Type: Investment] [Business: Animalz] [Location: IL, USA- 61019]

54 days ago

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.