Proofs
- Screenshots of fraudulent websites, emails, or investment offers.
- Transaction records from crypto wallets showing unauthorized transfers.
- Communication logs with scammers, including emails and messages.
- Wallet addresses used by fraudsters for transactions.