What makes Scam Sentry’s operation unique?
There’s no boardroom steering our mission. We’re not funded by advertisers, not beholden to shareholders, and not distracted by profit. Everything we do is guided by a single goal: to expose what others won’t. Where big platforms look the other way, we follow the abuse to its source—and document everything. Our strength comes from crowdsourced resistance, not marketing budgets—because real protection can’t be bought.
The Process
Scam Sentry operates on a simple but powerful cycle: collect, identify, report. We gather real-world phishing attempts and fraudulent links from users, honeypots, and inbox traps. Each submission is analyzed through our detection engine to identify patterns, referrer chains, and active scam infrastructure. Once confirmed, we generate a detailed report—complete with timestamps, source headers, screenshots, and reproduction steps—and file it with the appropriate registrar, host, or authority. Every step is transparent, archived, and designed to hold enablers accountable.
Legal Protections
Scam Sentry collects and shares scam-related data legally, using user submissions, public sources, and automated tools to document abuse. All reports are based on observed facts and are intended for public awareness and regulatory use—not as legal conclusions. We include disclaimers of liability for any third-party reliance on our data, and our findings should not be used as evidence against Scam Sentry or its team in any legal proceeding. Use of our data is subject to strict limitations: it may not be republished, altered, or used in litigation without written consent.
Subpoena Policy
Scam Sentry will respond to valid, court-issued subpoenas in accordance with applicable laws. Requests must be properly served and clearly identify the specific data being requested.
We reserve the right to charge standard fees for time and resources required to comply with subpoena requests. This includes $250/hour for data retrieval, plus reasonable costs for storage, formatting, and secure delivery.
Scam Sentry will reject any request that is overbroad, vague, lacks proper legal authority, or appears to be intended to intimidate, harass, or chill lawful public interest work. All requests are reviewed by counsel, and improper subpoenas will be challenged or ignored as appropriate.
Direct Partnerships
Scam Sentry works collaboratively with hosting providers, domain registrars, and regulatory bodies. Verified scam reports translate into formal requests, ICANN reports, or policy enforcement actions, to take down scams at the source.
Scam Sentry offers paid services (like our real-time API) to businesses that need enterprise-grade scam-detection. These funds go directly back into maintaining and improving the extension and its infrastructure.
Enterprise API
Scam Sentry works collaboratively with hosting providers, domain registrars, and regulatory bodies. Verified scam reports translate into formal requests, ICANN reports, or policy enforcement actions, to take down scams at the source. Scam Sentry offers paid services (like our real-time API) to businesses that need enterprise-grade scam-detection. These funds go directly back into maintaining and improving the extension and its infrastructure.
How You Can Help
- Install the Scam Sentry browser extension
- Report Suspicious Activity with one click whenever you encounter it.
- Share the Word—the more users we have, the faster we stop scams in their tracks.
Together, our distributed network and cutting-edge detection tools form a digital shield against fraud.