Get help safely
A calm, evidence-first flow for scam victims. Reduce further loss, organize proof, and take safer next steps without pressure tactics.
Before you do anything else, protect yourself.
Most victims get hit twice first by the scam, then by fake recovery agents. Follow these safety rules first.
Safety-first checklist (read this first)
- Never share OTP codes, seed phrases, private keys, or passwords.
- Never install remote access apps at a stranger’s request.
- Be cautious of anyone promising “guaranteed recovery” or demanding upfront fees.
- Preserve evidence first (screenshots, transaction refs, chat exports) before confronting or blocking.
A simple, structured flow
Four steps. Clear outputs. No hype.
Tell us what happened
A quick intake: platform, dates, amounts, and who contacted you.
Collect evidence safely
We guide what to export/save (transactions, chat logs, screenshots, identifiers).
Build your timeline
We organize everything into a clear narrative that’s easier to report.
Take safer next steps
You get reporting-ready notes and warnings that prevent re-victimization.
FAQs
Quick clarity before you begin.
No. You can start by organizing what happened and following safety-first steps. If any paid services exist, you’ll see them clearly no pressure tactics.
Ready to start the safe way?
Start a report to generate an evidence checklist, timeline, and reporting-ready summary without pressure tactics.
