$0 Elder Scam Shield Quick Start Checklist

Is There an FBI Scammer List? How to Check If Someone Is a Known Fraud

"Is there a list of scammers I can check?" It's one of the most common questions adult children ask when a parent starts an online relationship with someone they've never met in person, or receives an unsolicited job offer, investment tip, or government claim.

The short answer: yes, government fraud databases exist and contain useful information — but they work differently than most people expect. There's no single searchable directory of scammer names and photos. What does exist is a combination of official reporting databases, public fraud alerts, and free verification tools that, used together, can tell you a great deal about whether someone is who they claim to be.

Here's how the system actually works and how to use it to protect your parent.

What the FBI's IC3 Database Contains

The FBI operates the Internet Crime Complaint Center (IC3) at ic3.gov — the primary federal hub for reporting internet-based fraud. The IC3 receives hundreds of thousands of complaints per year and publishes an annual Internet Crime Report that contains aggregate data on scam types, victim counts, and financial losses by state and demographic.

What IC3 contains:

  • Fraud complaints submitted by victims and their families
  • Case data used by FBI field offices to investigate and prosecute
  • Annual public reports summarizing trends (available for free download at ic3.gov)

What IC3 does not have:

  • A public-facing searchable database of individual scammers by name, phone number, or photo
  • Real-time name lookups for suspected fraudsters
  • A way for the public to query whether a specific person has been reported

The data is law enforcement-only. This makes sense for investigative purposes — publishing a searchable name list would alert criminals that they've been flagged and allow them to change identities — but it means IC3 isn't a practical real-time verification tool for families.

What the FTC's Database Contains

The Federal Trade Commission operates a parallel system at ReportFraud.ftc.gov and IdentityTheft.gov. When someone files a complaint, it enters the Consumer Sentinel Network — a database shared with more than 2,000 law enforcement agencies at the federal, state, and local level.

Like IC3, this database is not directly searchable by the public by name. But the FTC does publish consumer alerts and fraud warnings by scam type, which are available at consumer.ftc.gov/scam-alerts. These alerts are useful for confirming whether a specific type of contact — a particular script, a specific payment method request — matches a known fraud pattern.

Practical use for families: If your parent has been contacted by someone claiming to work for a government agency, check whether the FTC has issued an alert about that specific agency being impersonated. These alerts are detailed and include the exact scripts scammers use.

The Romance Scam Verification Tools That Actually Work

For the specific concern of a parent developing an online relationship with someone they haven't met — a far more common scenario than most families realize — several practical tools can reveal whether the contact is real.

Reverse Image Search

This is the single most powerful tool for catching romance scammers and should be the first step in any verification.

Romance scammers steal photos of real people — often military personnel, doctors, engineers, or models — and use those photos to build a fake identity. Because the photos are often taken from social media, a reverse image search reveals where else that photo appears online.

How to do it:

On a computer:

  1. Right-click on any photo the suspected person has sent or posted
  2. Select "Search image with Google" (Chrome) or "Search Image" (other browsers)
  3. Review the results — if the photo appears under a different name or on a completely different profile, it's stolen

On a phone:

  1. Take a screenshot of the person's profile photo
  2. Open Google Images (images.google.com)
  3. Tap the camera icon > "Upload a file" > select your screenshot
  4. Review the results

TinEye (tineye.com) is a specialized reverse image search engine that is sometimes more effective than Google for finding stolen profile photos, particularly older images. Run the same photo through both.

If the person's photo appears under multiple different names, on stock photo sites, or on military personnel pages alongside a completely different identity — this is conclusive evidence of fraud. The research guide we mentioned earlier contains a specific conversation script for helping your parent accept this evidence without becoming defensive.

Social Media Profile Verification

A genuine person has a digital history. Ask these questions:

  • How long has the account existed? Scammer profiles are often less than a year old.
  • Do they have friends who interact with their posts? Or are the "likes" sparse and the comments generic?
  • Is there a consistent history of photos over time — not just a handful of professional-looking images?
  • Do their photos show consistent background details, aging, and life changes over the years?
  • Search their full name in quotes on Google. Does anything appear?

Phone Number Lookups

If your parent received a text or call from an unknown number, several free and paid tools can identify the owner:

  • BeenVerified (paid, ~$26/month) — runs phone numbers, email addresses, and names against a large aggregated database of public records
  • Spokeo (paid) — similar scope, sometimes more effective for cell numbers
  • Truecaller (free app) — crowdsourced caller ID database, effective for identifying numbers that other users have flagged as spam or scam
  • Hiya (free) — similar to Truecaller, good for flagging known robocall and scam numbers

For numbers associated with known scam operations, these tools often show community-submitted labels like "scam likely," "fraud," or "telemarketer."

Email Address Verification

If your parent has received emails from someone they're uncertain about:

  • Hunter.io (free tier) — verifies whether an email address matches a real professional domain. A scammer claiming to work for a major corporation but using a Gmail address is an immediate red flag.
  • Google the email address in quotes. Scammer email addresses are sometimes posted in fraud warning forums.
  • Check whether the email domain matches the claimed company's official website. An email from "[email protected]" is fake; Microsoft uses "@microsoft.com."

Free Download

Get the Elder Scam Shield Quick Start Checklist

Everything in this article as a printable checklist — plus action plans and reference guides you can start using today.

How to Check If a Phone Number Has Been Reported as Fraud

While the FBI doesn't maintain a public phone number lookup, several crowdsourced and government-linked resources do:

  • 800notes.com — user-submitted reports on phone numbers, organized by number. Particularly useful for identifying scam call operations that have targeted many people.
  • CallerComplaints.com — another user-report database, useful cross-reference
  • FTC's Do Not Call Violations — the FTC accepts reports of Do Not Call violations and illegal robocalls at DoNotCall.gov, and these feed into their enforcement database
  • Nomorobo's scam number database — if your parent has Nomorobo installed, it automatically blocks numbers in their constantly updated fraud database

None of these are official FBI lists, but they're actively maintained and often contain fresh reports from victims within days of a new scam operation starting.

What to Do When Verification Reveals a Scam

If your search reveals that the person contacting your parent has a stolen photo, a brand-new social media profile, or a phone number flagged by multiple users as fraud, the next step is the most important and the most difficult: telling your parent.

The challenge is that by the time a family member gets concerned enough to research, the scammer has often been cultivating a relationship for weeks or months. Your parent may be emotionally invested. Presenting evidence bluntly — "Mom, this person is a scammer" — frequently triggers defensiveness and can push the parent to hide the relationship rather than end it.

A more effective approach:

"I want you to have a real relationship with this person if they're genuine. Can we just do one thing together? Let's run their photo through a reverse image search — it takes 30 seconds. If it comes up clean, great. If not, it'll save us both a lot of worry."

This frames the exercise as something that benefits the relationship rather than an attack on your parent's judgment. The research guide covers several more variations of this conversation, including what to do if your parent refuses to look.

Reporting a Suspected Scammer

If your parent has been contacted by someone you've confirmed or strongly suspect is a scammer, report it — even if no money has been lost yet. These reports are what allow law enforcement to detect patterns and eventually prosecute operations.

Where to report:

  • FBI IC3 (ic3.gov) — for internet-based fraud, investment scams, romance fraud
  • FTC (ReportFraud.ftc.gov) — for any type of consumer fraud, phone scams, imposters
  • Elder Fraud Hotline (1-833-FRAUD-11) — operated by the DOJ, specifically for elder fraud cases; they assign case managers to help families navigate the process
  • Your state attorney general's office — most states have a consumer protection division that handles elder fraud
  • The platform where contact was made — Facebook, Instagram, LinkedIn, and dating apps all have fraud reporting mechanisms that can get the account removed quickly

There's no single master list that will instantly tell you if someone is a known scammer. But the combination of reverse image search, phone number databases, social media analysis, and email verification provides enough signal to make an informed judgment in most cases.

If you want a step-by-step verification checklist your parent can actually use before sending money or sharing personal information with anyone they've met online, the Elder Scam Shield guide includes one. It also covers the full fraud defense framework — from phone call blocking to financial monitoring to what to do in the first 24 hours if something goes wrong.

Get Your Free Elder Scam Shield Quick Start Checklist

Download the Elder Scam Shield Quick Start Checklist — a printable guide with checklists, scripts, and action plans you can start using today.

Learn More →