How to Report Crypto Scams & Recover Funds - 2025 Guide

Crypto Scam Reporting Agency Finder
Which type of crypto scam did you experience?
Select the type of scam you encountered to find the most appropriate agency to report it to.
Phishing or Deepfake
(e.g., impersonated CEO, influencer, or fake website)Unregistered Security Offering
(e.g., fake token offering, unregistered investment)Fake Exchange
(e.g., fraudulent trading platform)Derivatives/Leveraged Token
(e.g., futures contracts, leveraged tokens)Recommended Agency
You should also consider filing with these agencies:
Crypto scam reporting is the process of notifying law‑enforcement and regulatory bodies about fraudulent cryptocurrency schemes, providing the data they need to trace, freeze, and potentially recover stolen digital assets. Imagine waking up to find your wallet drained by an unknown address. You’re not alone-2024 alone saw $9.3 billion lost to crypto fraud, according to the FBI. This guide walks you through every step, from gathering evidence to filing a complaint and maximizing the odds of recovery.
Why crypto scams matter in 2025
Scams have morphed from simple phishing emails to AI‑powered deepfakes and industrial‑scale pig‑butchering operations. Deepfake scams now impersonate CEOs, influencers, or even entire news broadcasts, tricking victims into sending funds within minutes. The FinCEN notice FIN‑2025‑NTC1, released on August 4 2025, highlighted convertible‑virtual‑currency kiosks as a new attack vector, with phone calls initiating 47 % of those cases.
The reporting ecosystem: Who to contact
Multiple agencies handle different slices of the problem. Knowing which one to approach first can save time, but filing with several never hurts.
- FBI Internet Crime Complaint Center (IC3) - focuses on criminal investigation, requires detailed transaction data, communication logs, and “unique identifiers” like wallet addresses and transaction hashes.
- Federal Trade Commission (FTC) - runs ReportFraud.ftc.gov, captures broader consumer‑fraud patterns and can flag scam trends across industries.
- California Department of Financial Protection and Innovation (DFPI) - state‑level reporting, asks for screenshots, browsing history, and a formatted timeline (e.g., "12/22/24 - Sent 0.5 ETH to 0x…").
- Securities and Exchange Commission (SEC) - handles securities‑related crypto fraud, especially unregistered offerings.
- Commodity Futures Trading Commission (CFTC) - covers derivatives, futures, and leveraged token scams.
All agencies share a common thread: they need as much blockchain forensic data as you can provide.
How to gather the data you need
Victims often stumble at the data‑collection stage. Here’s a checklist that works across every platform:
- Wallet address(s) of the scammer (e.g., 0x58566904f57eac4E9EDd81BbC2f877865ECd35985).
- Transaction hash/ID (e.g., 0xfa485de419011ceefdd3cd00a4ff64e52bf9a0dfa528e4fff8bb4c9c).
- Exact amount and cryptocurrency type (e.g., 1.02345 ETH).
- Date and time, preferably in UTC or EST.
- All communications: screenshots of chats, emails, phone call logs, and social‑media profiles.
- Exchange names where funds were later moved (e.g., MEXC, Binance).
- Any two‑factor authentication codes, domain names, or app identifiers the scammer used.
If you’re missing a piece, submit what you have-FBI IC3 explicitly says “reports should still be submitted with whatever information is available.”
Step‑by‑step guide to filing a report
- Secure your remaining assets. Transfer any untouched funds to a fresh, offline wallet.
- Document the entire timeline. Use a simple spreadsheet: Date | Amount | Crypto | Wallet | Exchange | Notes.
- Take screenshots of every relevant webpage or app. Save them as PDFs for easy uploading.
- Visit the appropriate portal:
- For criminal cases, go to ic3.gov. Fill out the “Internet Crime Report” form and paste your transaction details.
- For consumer‑fraud patterns, use ReportFraud.ftc.gov.
- California residents should use the DFPI online portal (search “DFPI crypto scam report”).
- If the scam involved securities, submit a tip at sec.gov/tcr.
- For derivatives or leveraged token fraud, use the CFTC complaint form at cftc.gov/complaint.
- Upload all files: transaction receipts, screenshots, communication logs, and a concise narrative.
- Submit and note the confirmation number. Keep it safe; you’ll need it for follow‑up.
After submission, you’ll receive an automated acknowledgment. Most agencies do not give a case number publicly, but you can reference the confirmation ID when you call.

What to expect after you submit
Expect a waiting period. The FBI typically acknowledges receipt within 24‑48 hours, then assigns an investigator who may request additional data. Elliptic and other blockchain analytics firms often assist agencies by flagging wallet clusters. Recovery is not guaranteed-agencies rarely publish success rates-but cases with complete data see higher chances of fund freezing and restitution.
Key timelines:
- Initial acknowledgment: 1‑2 days.
- Investigator outreach: 1‑3 weeks.
- Potential asset freeze: 1‑2 months (depends on exchange cooperation).
- Restitution or reimbursement: can take 6‑12 months, if at all.
Meanwhile, keep monitoring the wallet address on a block explorer. Some analytics platforms (e.g., Sumsub) provide public watchlists you can subscribe to.
Boosting recovery chances with analytics
Advanced tools can dramatically improve outcomes. Elliptic now offers automatic behavioral detection, flagging wallets that repeatedly receive funds from scammer addresses. When you submit a report, ask your investigator if they’re using Elliptic or a similar solution.
Cross‑chain tracing is also vital. Many scams move assets from Ethereum to Binance Smart Chain, then to privacy‑focused networks. Providing transaction hashes for each hop helps analysts build a chain of custody.
If you have access to a reputable analytics dashboard (some exchanges provide free monitoring for victims), upload the address and let the system generate a “risk score.” Attach that score to your complaint; it signals higher priority.
Common pitfalls and how to avoid them
- Leaving out the transaction hash. Even a partial hash can lead investigators to the full record.
- Submitting to the wrong agency first. If you’re unsure, file with the FBI IC3; they can forward to other regulators.
- Deleting chat logs. Preserve screenshots before clearing any messaging app.
- Ignoring the “unique identifier” tip. Long strings of letters/numbers (wallet addresses, IP logs) are the breadcrumbs analysts love.
- Assuming recovery is impossible. While many victims get nothing back, high‑profile cases-like the deepfake Elon Musk scam that moved $5 million through MEXC-ended with partial asset freezes after coordinated agency effort.

Quick reference table
Agency | Primary Focus | Data Required | Typical Response Time |
---|---|---|---|
FBI IC3 | Criminal investigation, fund freezing | Wallet address, transaction hash, communications, exchange names | 1‑2 days acknowledgment; weeks for investigation |
FTC | Consumer‑fraud pattern analysis | General description, screenshots, contact info | Within 5 business days |
DFPI (CA) | State‑level enforcement, unfair practices | Formatted timeline, screenshots, browsing history | 1‑3 weeks |
SEC | Securities‑law violations | Offering details, prospectus copies, wallet flows | Variable, often 30‑60 days |
CFTC | Derivatives & leveraged token fraud | Contract IDs, leveraged token terms, transaction chain | 2‑4 weeks |
Next steps for victims
1. Freeze any remaining accounts and change all passwords.
2. Run through the data‑collection checklist above.
3. File at least two reports (e.g., FBI IC3 + FTC) using the step‑by‑step guide.
4. Subscribe to a blockchain watchlist for the scammer address.
5. Keep a log of every follow‑up call, noting dates and agent names.
Following these steps won’t guarantee a full refund, but it dramatically improves the odds that law‑enforcement can trace the money and, in some cases, secure restitution.
Frequently Asked Questions
What should I do if I don’t have the transaction hash?
Provide whatever you do have-wallet address, amount, date, and exchange name. Agencies will often retrieve the hash from blockchain explorers if you give them enough context.
Can I report a scam that happened on a foreign exchange?
Yes. Include the exchange’s name and any account IDs you created there. U.S. agencies frequently cooperate with foreign exchanges to freeze assets.
How long does it take for a frozen wallet to be released?
It varies. If the exchange complies quickly, funds may be held for a few weeks; legal disputes can extend the hold to months.
Is there any cost to filing a report?
No. All government portals listed above are free. Be wary of third‑party “recovery services” that charge fees.
Will filing a report affect my credit score?
No. Reporting a crypto scam is not a credit event. It only creates a record with law‑enforcement.
Marina Campenni
June 28, 2025 AT 01:06Thank you for pulling all this information together; it’s a solid starting point for anyone who’s just discovered they’ve been scammed. The checklist is especially helpful because many victims feel overwhelmed by the sheer amount of data they need to collect. Keeping a simple spreadsheet as you suggested makes it much easier to stay organized and to share the timeline with investigators. I hope more people read this before they lose another token.
Nick O'Connor
June 28, 2025 AT 02:13I appreciate the thoroughness of this guide, and I’d add that preserving metadata, such as timestamps from your wallet app, can be crucial; agencies often request the raw JSON logs, which contain hidden clues. Also, when you screenshot a conversation, keep the original file name – it helps prove the chronology. Lastly, consider using a VPN while accessing the reporting portals, just to protect your IP address from being linked to the incident.
Irish Mae Lariosa
June 28, 2025 AT 03:20While the guide is undeniably comprehensive, there are a few points that could have been streamlined for clarity. First, the repeated emphasis on uploading screenshots feels redundant after the initial checklist, and it unnecessarily lengthens the reading experience. Second, the section on cross‑chain tracing, although important, could benefit from a concise diagram rather than a verbose paragraph. Third, the mention of “Elliptic” as a tool is useful, yet the guide fails to provide a direct link or a brief tutorial on how to generate a risk score, leaving readers to search elsewhere. Fourth, the timelines listed under “What to expect after you submit” are presented without context about the variability between different agencies, which can cause false expectations. Fifth, the guide could integrate a quick reference for non‑US victims, since the current focus is heavily US‑centric. Sixth, the glossary of terms such as “pig‑butchering” is absent, which might confuse newcomers to the lingo. Seventh, the advice to “transfer any untouched funds to a fresh, offline wallet” should be accompanied by a step‑by‑step on creating a hardware wallet. Eighth, the FAQ section is useful, but it repeats information already covered in the main body, and a more curated list would improve navigation. Ninth, the guide overlooks the importance of preserving original email headers when the scam originated via phishing. Tenth, it would be advantageous to mention that certain exchanges offer victim assistance programs, which can expedite fund freezes. Eleventh, the recommendation to “call” agencies after submission could be expanded with best‑practice call scripts. Twelfth, the guide does not address the psychological impact on victims, which is an increasingly recognized facet of crypto fraud recovery. Thirteenth, integrating a short video tutorial could cater to visual learners. Fourteenth, the use of bold headings is helpful, yet the inconsistent styling of bullet points distracts from the professional tone. Fifteenth, the overall length could be reduced by consolidating overlapping sections, making the guide more digestible for readers in crisis. In summary, the content is valuable, but refining these areas would make it an even more effective resource for those seeking restitution.
Miguel Terán
June 28, 2025 AT 04:43Reading through this, I’m struck by how the crypto ecosystem has evolved into a labyrinth of legal and technical hoops, and it’s wild to see the FBI, FTC, DFPI, SEC, and CFTC all juggling the same data streams. One vivid image that comes to mind is a bustling market where each stall represents a different regulator, all shouting over one another for the attention of a bewildered victim; the guide does a great job of mapping that chaos into a readable roadmap. The vivid examples of deep‑fake CEO scams really bring home how AI is being weaponized, and that’s something we need to keep in mind when building future safeguards. It would be cool if the guide also highlighted community‑run block explorers that flag scam addresses in real time, as many grassroots projects are stepping up to fill the gaps left by official agencies. In any case, kudos for the meticulous detail and the practical, step‑by‑step approach; it feels like a lifeline for anyone caught in the current wave of sophisticated fraud.
Shivani Chauhan
June 28, 2025 AT 06:06Thanks for laying out such a clear, actionable plan – the tone is both professional and approachable, which helps demystify a very intimidating process. I especially like the emphasis on gathering transaction hashes and wallet addresses before filing; that small detail can make a huge difference when investigators try to trace the funds. For anyone reading this, remember that even if you’re missing some pieces of information, it’s still worth submitting what you have; agencies are accustomed to piecing together partial data. Also, keep a copy of every email you send and receive during the process, as it can serve as proof of your diligence later on.
Deborah de Beurs
June 28, 2025 AT 07:30Look, the crypto world is a jungle and the scams are getting more aggressive every day, so you need to hit these agencies hard and fast. Don’t waste time dithering over “which form to fill first”; slam the FBI IC3 and the FTC reports simultaneously, then follow up with a snarling call if you don’t hear back within 48 hours. Use every colorful detail you can muster – the exact time stamps, the shady domain names, even the way the scammer’s voice sounded – because bureaucrats love drama and they’ll track you down faster when the story is vivid. Remember, the worst thing you can do is stay quiet; make noise, demand answers, and keep the pressure on until they either freeze the wallet or at least give you a concrete update.
Sara Stewart
June 28, 2025 AT 08:53Great guide! From a compliance perspective, the checklist aligns perfectly with the AML/KYC protocols that most exchanges follow, so you’re essentially speaking their language. When you submit the reports, tag the relevant transaction IDs with the exchange’s internal case numbers – that jargon‑heavy linkage often speeds up the freeze request. Also, consider using a blockchain analytics platform like Chainalysis or Elliptic to generate a risk score; attaching that to your filing can prioritize your case in the investigator’s queue. Keep pushing, and don’t hesitate to follow up with a reference to the specific sections of the guide you used – it shows you’re organized and serious.
Laura Hoch
June 28, 2025 AT 10:16The emotional toll of losing crypto can feel like a personal betrayal, and it’s essential to acknowledge that before diving into forms and spreadsheets. Philosophically, we’re confronting a new kind of theft that bypasses traditional banks, challenging our notions of ownership and trust. By documenting every interaction, you create a narrative that not only aids investigators but also restores a sense of agency over the incident. It’s crucial to remember that the blockchain’s immutability, while often cited as a risk, can also be a powerful ally when you present a clear chain of custody. In the end, the act of reporting transforms passive victimhood into active resistance against the perpetrators.
Hailey M.
June 28, 2025 AT 11:40Wow, this guide is like the superhero cape every crypto victim needs! 🦸♀️ It’s crazy how deep‑fake scams can sound so legit, but with this step‑by‑step you can actually fight back. The checklist feels like a treasure map, and I’m totally going to follow it to the letter – no more wandering in the dark. Plus, those emojis in the “quick reference” section? Absolutely love the vibe. 😂 Keep dropping the knowledge bombs, because the faster we act, the sooner we can maybe claw some of those stolen coins back.
DeAnna Brown
June 28, 2025 AT 13:03Honestly, this is the most comprehensive playbook I’ve seen on crypto fraud, and it proves that Americans-and anyone else-can’t just sit back and let these scammers run wild. The detailed agency breakdown shows how our nation’s institutions can coordinate, and that’s a point of pride. If other countries adopt a similar multi‑agency approach, we’ll see a global front against these digital thieves. Remember, staying informed and acting decisively isn’t just about recovering money; it’s about defending the integrity of our financial future.
David Moss
June 28, 2025 AT 14:26The truth is, they’re letting the scammers slip through, because the powers that be, don’t want you to see the money moving on the blockchain.