I have a new tool that pretty much makes a browser fingerprint of everyone that clicks on it, then redirects them to a Grabify with a smart logger enabled, which then redirects them to a page displaying a generic error. If you ever want to IP log a scammer, let me know, and I can create a unique link for the scammer you’re talking to.
We can record all the scam communications sent, the communication methods, the phone number/email, etc., then see if we can connect scam emails together based on Grabify data/browser fingerprints.
Data collected (as well as the scam messages & communications themselves, of course):
By fingerprint
(there is also a unique numeric ID generated based on the below information)
- User agent
- Browser
- Browser engine (e.g. Blink, Webkit)
- Operating System
- Device CPU
- Is mobile device? (y/n)
- Screen resolution
- Screen color depth
- Screen XPDI
- Screen YDPI
- Browser plugins
- System fonts
- Are cookies enabled?
- Is Local Storage enabled?
- Is Session Storage enabled?
- Time zone
- Device language
- Is the
<canvas>tag available?
By Grabify
- Date/Time
- IP Address
- Country
- City
- Battery
- Charging
- Orientation
- Connection Type
- Timezone
- Language
- Incognito/Private Window
- Ad Blocker
- Screen Size
- Local IP
- Browser
- Operating System
- Device
- GPU
- Bot Name & Bot URL (if applicable)
- User Agent
- Host Name
- ISP
- VPN/Proxy Detection
- Tor Detection
- Virtual Machine Detection
- Referring URL (not applicable in this case, as my fingerprinting site would redirect them to it)