ℹ️ Skipped - page is already crawled
| Filter | Status | Condition | Details |
|---|---|---|---|
| HTTP status | PASS | download_http_code = 200 | HTTP 200 |
| Age cutoff | PASS | download_stamp > now() - 6 MONTH | 0 months ago |
| History drop | PASS | isNull(history_drop_reason) | No drop reason |
| Spam/ban | PASS | fh_dont_index != 1 AND ml_spam_score = 0 | ml_spam_score=0 |
| Canonical | PASS | meta_canonical IS NULL OR = '' OR = src_unparsed | Not set |
| Property | Value |
|---|---|
| URL | https://www.ic3.gov/ |
| Last Crawled | 2026-04-16 13:58:14 (1 day ago) |
| First Indexed | 2013-08-09 04:13:31 (12 years ago) |
| HTTP Status Code | 200 |
| Meta Title | Home Page - Internet Crime Complaint Center (IC3) |
| Meta Description | null |
| Meta Canonical | null |
| Boilerpipe Text | Welcome to the Internet Crime Complaint Center
The Internet Crime Complaint Center (IC3) is the central hub for reporting cyber-enabled crime. It is run by the FBI, the lead federal agency for investigating crime.
For more information about the IC3 and its mission, please see the
About Us
page.
File a Complaint with Us
The IC3 focuses on collecting cyber-enabled crime. Crimes against children should be filed with the
National Center for Missing and Exploited Children
. Other types of crimes, such as threats of terrorism, should be reported at
tips.fbi.gov
.
How You Can Help
Tell us what happened.
File a report to share information with the FBI. IC3 is the main intake form for a variety of complaints — everything from cyber-enabled frauds and scams to cybercrime — so file a report even if you are unsure of whether your complaint qualifies.
Your contribution and our mission.
Your report helps us fulfill our mission of protecting the American people. While we cannot guarantee a response to every complaint, your report is still valuable. It helps us understand the broader threat landscape. Furthermore, in those cases where we are able to take action, we will work to provide justice.
Protect yourself and others.
If you have suffered from a cyber-enabled crime, please know that you are not alone. Use the resources on this site to learn more about how to protect yourself and others from cybercrime.
Protecting Our Digitally-connected World is a Top Priority and Focus of the FBI
We Need You
Between staying connected with family and friends, shopping and banking online, and working remotely, we all depend on security in our interconnected digital world. Criminals from every corner of the globe attack our digital systems on a near constant basis. They strike targets large and small — from corporate networks to personal smart phones. No one — and no device — is immune from the threat. The only way forward is together. In cyber security, where a single compromise can impact millions of people, there can be no weak links. Every organization and every individual needs to take smart, reasonable steps to protect their own devices and systems and to learn how to spot and avoid scams.
Chart includes loss data for the years 2020 to 2024. Over this time period, over $50 billion dollars were reported lost.
For more information, please read our most recent Annual Report:
The Information You Submit to IC3 Makes All the Difference
Combined with other data, it allows the FBI to investigate reported crimes, track trends and threats, and, in some cases, even freeze stolen funds. Just as importantly, IC3 shares reports of crime throughout its vast network of FBI field offices and law enforcement partners, strengthening our nation’s collective response both locally and nationally.
Due to the massive number of complaints, we receive each year, IC3 cannot respond directly to every submission, but please know we take each report seriously. With your help, we can and will respond faster, defend cyber networks better, and more effectively protect our nation.
Recent IC3 Alerts
Public
Apr
07
Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information
Mar
31
Data Security Risks of Using Foreign-Developed Mobile Apps in the United States
Mar
20
Russian Intelligence Services Target Commercial Messaging Application Accounts
Mar
12
Evading Residential Proxy Networks: Protecting Your Devices from Becoming a Tool for Criminals
Mar
09
Criminals Impersonating City and County Officials in Phishing Emails for Planning and Zoning Permits
Industry
Apr
07
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
Mar
20
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets
Mar
12
AVrecon Malware-Infected Routers Exploited as Residential Proxies by SocksEscort
Feb
19
Increase in Malware Enabled ATM Jackpotting Incidents Across United States
Feb
05
Reducing the Attack Surface for End-of-Support Edge Devices |
| Markdown | [Skip to content](https://www.ic3.gov/#main-content)

An official website of the United States government
Here’s how you know
Here’s how you know

**Official websites use .gov**
A **.gov** website belongs to an official government organization in the United States.

**Secure .gov websites use HTTPS**
A **lock** ( Locked padlock icon) or **https://** means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
[](https://www.ic3.gov/Home/Index)
*[Internet Crime Complaint Center (IC3)](https://www.ic3.gov/Home/Index)*
Menu
- [File A Complaint](https://www.ic3.gov/#fileTerms)
- Public Info
- [Public Service Announcements](https://www.ic3.gov/PSA)
- [Brochures](https://www.ic3.gov/Outreach/Brochures)
- [Annual Reports](https://www.ic3.gov/AnnualReport/Reports)
- [Resources](https://www.ic3.gov/Outreach/Resources)
- Industry Info
- [Industry Alerts](https://www.ic3.gov/CSA)
- [Contact FBI Cyber](https://www.ic3.gov/ContactFBICyber)
- [Cyber Private Sector](https://www.ic3.gov/Outreach/PrivateSectorEngagement)
- Crime Info
- [Account Takeover (ATO)](https://www.ic3.gov/CrimeInfo/AccountTakeover)
- [Botnet/DDoS/TDoS](https://www.ic3.gov/CrimeInfo/Botnet-DDoS)
- [Business Email Compromise (BEC)](https://www.ic3.gov/CrimeInfo/BEC)
- [Chinese Authority Impersonation](https://www.ic3.gov/CrimeInfo/ChineseAuthorityImpersonation)
- [Cryptocurrency](https://www.ic3.gov/CrimeInfo/Cryptocurrency)
- [Data Breach](https://www.ic3.gov/CrimeInfo/DataBreach)
- [Elder Fraud](https://www.ic3.gov/CrimeInfo/ElderFraud)
- [Investment Fraud](https://www.ic3.gov/CrimeInfo/Investment)
- [Other Common Scams](https://www.fbi.gov/scams-and-safety)
- [Ransomware](https://www.ic3.gov/CrimeInfo/Ransomware)
- [Tech/Customer Support and Government Impersonation](https://www.ic3.gov/CrimeInfo/TechSupportGovImpersonation)
# Welcome to the Internet Crime Complaint Center
The Internet Crime Complaint Center (IC3) is the central hub for reporting cyber-enabled crime. It is run by the FBI, the lead federal agency for investigating crime.
For more information about the IC3 and its mission, please see the [About Us](https://www.ic3.gov/Home/About) page.
## File a Complaint with Us
If you or someone else is in immediate danger, please call 911 or your local police.
The IC3 focuses on collecting cyber-enabled crime. Crimes against children should be filed with the [National Center for Missing and Exploited Children](https://www.ic3.gov/Egress/https/report.cybertip.org/443/B144AE1A444A360E687E858B62C3D8913EADD8B1D19AB98AEBD01849ABF34204). Other types of crimes, such as threats of terrorism, should be reported at [tips.fbi.gov](https://www.fbi.gov/tips/).
File A Complaint
## How You Can Help
- ### Tell us what happened.
File a report to share information with the FBI. IC3 is the main intake form for a variety of complaints — everything from cyber-enabled frauds and scams to cybercrime — so file a report even if you are unsure of whether your complaint qualifies.
- ### Your contribution and our mission.
Your report helps us fulfill our mission of protecting the American people. While we cannot guarantee a response to every complaint, your report is still valuable. It helps us understand the broader threat landscape. Furthermore, in those cases where we are able to take action, we will work to provide justice.
- ### Protect yourself and others.
If you have suffered from a cyber-enabled crime, please know that you are not alone. Use the resources on this site to learn more about how to protect yourself and others from cybercrime.
## Protecting Our Digitally-connected World is a Top Priority and Focus of the FBI
### We Need You
Between staying connected with family and friends, shopping and banking online, and working remotely, we all depend on security in our interconnected digital world. Criminals from every corner of the globe attack our digital systems on a near constant basis. They strike targets large and small — from corporate networks to personal smart phones. No one — and no device — is immune from the threat. The only way forward is together. In cyber security, where a single compromise can impact millions of people, there can be no weak links. Every organization and every individual needs to take smart, reasonable steps to protect their own devices and systems and to learn how to spot and avoid scams.

Chart includes loss data for the years 2020 to 2024. Over this time period, over \$50 billion dollars were reported lost.
For more information, please read our most recent Annual Report:
[Annual Report](https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf)
### The Information You Submit to IC3 Makes All the Difference
Combined with other data, it allows the FBI to investigate reported crimes, track trends and threats, and, in some cases, even freeze stolen funds. Just as importantly, IC3 shares reports of crime throughout its vast network of FBI field offices and law enforcement partners, strengthening our nation’s collective response both locally and nationally.
Due to the massive number of complaints, we receive each year, IC3 cannot respond directly to every submission, but please know we take each report seriously. With your help, we can and will respond faster, defend cyber networks better, and more effectively protect our nation.
## Recent IC3 Alerts
### Public
[](https://www.ic3.gov/PSA/RSS)
- Apr 07
#### [Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information](https://www.ic3.gov/PSA/2026/PSA260407)
- Mar 31
#### [Data Security Risks of Using Foreign-Developed Mobile Apps in the United States](https://www.ic3.gov/PSA/2026/PSA260331)
- Mar 20
#### [Russian Intelligence Services Target Commercial Messaging Application Accounts](https://www.ic3.gov/PSA/2026/PSA260320)
- Mar 12
#### [Evading Residential Proxy Networks: Protecting Your Devices from Becoming a Tool for Criminals](https://www.ic3.gov/PSA/2026/PSA260312)
- Mar 09
#### [Criminals Impersonating City and County Officials in Phishing Emails for Planning and Zoning Permits](https://www.ic3.gov/PSA/2026/PSA260309)
### Industry
[](https://www.ic3.gov/CSA/RSS)
- Apr 07
#### [Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure](https://www.ic3.gov/CSA/2026/260407.pdf)
- Mar 20
#### [Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets](https://www.ic3.gov/CSA/2026/260320.pdf)
- Mar 12
#### [AVrecon Malware-Infected Routers Exploited as Residential Proxies by SocksEscort](https://www.ic3.gov/CSA/2026/260312.pdf)
- Feb 19
#### [Increase in Malware Enabled ATM Jackpotting Incidents Across United States](https://www.ic3.gov/CSA/2026/260219.pdf)
- Feb 05
#### [Reducing the Attack Surface for End-of-Support Edge Devices](https://www.ic3.gov/CSA/2026/260205.pdf)
#### Terms and Conditions
Prior to filing a complaint with the IC3, please read the following information regarding terms and conditions.
Should you have additional questions prior to filing your complaint, view [FAQ](https://www.ic3.gov/Home/FAQ) for more information on inquiries such as:
- What details will I be asked to include in my complaint?
- What happens after I file a complaint?
- How are complaints resolved?
- Should I retain evidence related to my complaint?
Complaints filed via this website are analyzed and may be referred to federal, state, local or international law enforcement and partner agencies for possible investigation.
The complaint information you submit to this site is encrypted via secure socket layer (SSL) encryption. Please see the [Privacy Policy](https://www.ic3.gov/Home/Privacy) for further information.
We thank you for your cooperation.
***
By clicking "I Accept" you acknowledge the following:
I understand any contact or investigation regarding any complaint I file on this website is initiated at the discretion of the agency receiving the complaint information. I will not be contacted by the IC3.
The information I'm providing on this form is correct to the best of my knowledge. I understand that providing false information could make me subject to fine, imprisonment, or both. (TITLE 18, U.S. CODE, SECTION 1001)
- Accept
- Decline
[Return to top](https://www.ic3.gov/)
#### IC3
- [Home Page](https://www.ic3.gov/)
- [Privacy Policy](https://www.ic3.gov/Home/Privacy)
- [About IC3](https://www.ic3.gov/Home/About)
#### FBI
- [Home Page](https://www.fbi.gov/)
- [Privacy Policy](https://www.fbi.gov/privacy-policy)
- [About FBI](https://www.fbi.gov/about)
#### DOJ
- [Home Page](https://www.justice.gov/)
- [Privacy Policy](https://www.justice.gov/doj/privacy-policy)
- [About DOJ](https://www.justice.gov/about)
#### Contact the FBI Press Office
- [(202) 324-3691](tel:1-202-324-3691)
- [Accessibility Statement](https://www.fbi.gov/accessibility)
- **Questions?** [See the IC3 FAQ](https://www.ic3.gov/Home/FAQ)

# FBI
### Federal Bureau of Investigation
FBI.gov Contact Center |
| Readable Markdown | ## Welcome to the Internet Crime Complaint Center
The Internet Crime Complaint Center (IC3) is the central hub for reporting cyber-enabled crime. It is run by the FBI, the lead federal agency for investigating crime.
For more information about the IC3 and its mission, please see the [About Us](https://www.ic3.gov/Home/About) page.
## File a Complaint with Us
The IC3 focuses on collecting cyber-enabled crime. Crimes against children should be filed with the [National Center for Missing and Exploited Children](https://www.ic3.gov/Egress/https/report.cybertip.org/443/B144AE1A444A360E687E858B62C3D8913EADD8B1D19AB98AEBD01849ABF34204). Other types of crimes, such as threats of terrorism, should be reported at [tips.fbi.gov](https://www.fbi.gov/tips/).
## How You Can Help
- Tell us what happened.
File a report to share information with the FBI. IC3 is the main intake form for a variety of complaints — everything from cyber-enabled frauds and scams to cybercrime — so file a report even if you are unsure of whether your complaint qualifies.
- Your contribution and our mission.
Your report helps us fulfill our mission of protecting the American people. While we cannot guarantee a response to every complaint, your report is still valuable. It helps us understand the broader threat landscape. Furthermore, in those cases where we are able to take action, we will work to provide justice.
- Protect yourself and others.
If you have suffered from a cyber-enabled crime, please know that you are not alone. Use the resources on this site to learn more about how to protect yourself and others from cybercrime.
## Protecting Our Digitally-connected World is a Top Priority and Focus of the FBI
### We Need You
Between staying connected with family and friends, shopping and banking online, and working remotely, we all depend on security in our interconnected digital world. Criminals from every corner of the globe attack our digital systems on a near constant basis. They strike targets large and small — from corporate networks to personal smart phones. No one — and no device — is immune from the threat. The only way forward is together. In cyber security, where a single compromise can impact millions of people, there can be no weak links. Every organization and every individual needs to take smart, reasonable steps to protect their own devices and systems and to learn how to spot and avoid scams.

Chart includes loss data for the years 2020 to 2024. Over this time period, over \$50 billion dollars were reported lost.
For more information, please read our most recent Annual Report:
### The Information You Submit to IC3 Makes All the Difference
Combined with other data, it allows the FBI to investigate reported crimes, track trends and threats, and, in some cases, even freeze stolen funds. Just as importantly, IC3 shares reports of crime throughout its vast network of FBI field offices and law enforcement partners, strengthening our nation’s collective response both locally and nationally.
Due to the massive number of complaints, we receive each year, IC3 cannot respond directly to every submission, but please know we take each report seriously. With your help, we can and will respond faster, defend cyber networks better, and more effectively protect our nation.
## Recent IC3 Alerts
### Public
[](https://www.ic3.gov/PSA/RSS)
- Apr 07
[Russian GRU Exploiting Vulnerable Routers to Steal Sensitive Information](https://www.ic3.gov/PSA/2026/PSA260407)
- Mar 31
[Data Security Risks of Using Foreign-Developed Mobile Apps in the United States](https://www.ic3.gov/PSA/2026/PSA260331)
- Mar 20
[Russian Intelligence Services Target Commercial Messaging Application Accounts](https://www.ic3.gov/PSA/2026/PSA260320)
- Mar 12
[Evading Residential Proxy Networks: Protecting Your Devices from Becoming a Tool for Criminals](https://www.ic3.gov/PSA/2026/PSA260312)
- Mar 09
[Criminals Impersonating City and County Officials in Phishing Emails for Planning and Zoning Permits](https://www.ic3.gov/PSA/2026/PSA260309)
### Industry
[](https://www.ic3.gov/CSA/RSS)
- Apr 07
[Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure](https://www.ic3.gov/CSA/2026/260407.pdf)
- Mar 20
[Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets](https://www.ic3.gov/CSA/2026/260320.pdf)
- Mar 12
[AVrecon Malware-Infected Routers Exploited as Residential Proxies by SocksEscort](https://www.ic3.gov/CSA/2026/260312.pdf)
- Feb 19
[Increase in Malware Enabled ATM Jackpotting Incidents Across United States](https://www.ic3.gov/CSA/2026/260219.pdf)
- Feb 05
[Reducing the Attack Surface for End-of-Support Edge Devices](https://www.ic3.gov/CSA/2026/260205.pdf) |
| Shard | 53 (laksa) |
| Root Hash | 16040769800153931853 |
| Unparsed URL | gov,ic3!www,/ s443 |