Check messages, URLs, phone numbers, payment clues, and sender behavior for visible red flags.
Philippine-focused cyber safety guidance
Cyber Sentinel AI
A practical cyber incident workspace for scam checks, evidence review, report preparation, and AI-assisted case documentation.
Use Cyber Sentinel to check suspicious messages and links, analyze uploaded evidence, organize timelines, and prepare clearer report-ready summaries for platform, provider, office, or professional review.
Extract text, preserve hashes, organize screenshots, receipts, URLs, usernames, and timeline notes.
Create structured incident summaries, evidence checklists, and draft templates for review.
Cyber Awareness Alert
Scam AlertFake Maya and GCash verification links
Attackers send QR codes or SMS links that lead to fake login pages to steal accounts.
Increase in fake e-wallet verification scams and credential phishing.
Report suspicious messages, block the sender, and warn your community.
Today's threat level
High
Current focus: e-wallet verification links, fake sellers, account takeover, and extortion threats.
Cyber safety focus
Preserve first. Verify next.
Keep screenshots, links, transaction records, and timestamps before blocking, deleting, or replying.
Short statistics
Admin-published safety feed
Cyber Awareness Center
Read curated scam alerts, evidence tips, safety guides, and threat trends without turning CyberSentinel into a public accusation board.
Fake E-Wallet Verification
Fake e-wallet verification links are using urgency and QR payment lures.
Preserve Before Blocking
Keep transaction IDs, profile links, screenshots, and exact dates before filing.
Private Data Stays Private
Do not post private numbers, IDs, OTPs, bank details, or personal photos publicly.
Initial guidance
AI Cyber Incident Assessment
Describe the incident once. Cyber Sentinel AI will organize the story, flag observable scam indicators, suggest evidence to preserve, and draft a reporting-assistance summary.
Assessment result
Alerts
Scam Alerts
Browse common scam patterns, warning signs, and immediate safety actions. Verify urgent advisories through official sources before sharing.
Private incident workspace
CyberSentinel Case Builder
Turn raw incident facts into a structured case assessment, evidence gap review, and draft-ready case folder plan.
Informational AI assessment only. Not an official finding, legal advice, or law-enforcement determination.
Case Builder Output
Draft preparationEvidence Guidance
Preserve screenshots, URLs, usernames, phone numbers, transaction IDs, dates, receipts, chat exports, and platform support ticket numbers. Do not upload passwords, OTPs, or unnecessary private files.
Reporting Direction
Possible direction may include bank/e-wallet support, telco, platform support, PNP/NBI/CICC/NTC/BSP depending on the facts. This does not imply government affiliation.
Report Preparation
Generate a structured narrative, timeline, evidence summary, and report-ready format for review before submitting through proper channels.
Verification
Scam Risk Check
Phone number checker
SMS / callsThis tool provides educational and risk-assessment guidance only. It cannot access private telco subscriber records, SIM registration owner details, or real-time phone location.
Payment link and seller detector
LinksIs this message fake?
AI-style analyzerScam screenshot analyzer
PrototypeUpload image, PDF, document, or text file of a text, page, chat, or payment request
Document authenticity analyzer
OCR + metadataDo not upload sensitive documents unless you have authority or consent.
Upload ID, certificate, receipt, screenshot, PDF, document, image, or text file
Cyber Awareness Center
Cyber Awareness Center
Admin-published scam alerts, safety guides, evidence tips, and threat trends for safer public learning.
CyberSentinel does not host public accusations or user-generated allegation threads. Awareness posts are educational guidance only and do not represent official findings, legal advice, government action, or law-enforcement confirmation.
Recognize
Look for urgency, impersonation, suspicious links, payment pressure, OTP requests, blackmail, or unusual account activity.
Resist
Do not click, pay, install, share codes, or negotiate blindly. Verify through the official app, website, hotline, or known contact.
Preserve
Save screenshots, URLs, usernames, phone numbers, receipts, timestamps, and the full conversation before deleting or blocking.
Report
Use the provider, platform, bank, e-wallet, telco, PNP ACG, NBI, CICC, NPC, BSP, or other proper channel when applicable.
What This Center Publishes
Admin controlledCurrent Lures
Fake e-wallet support, courier SMS, fake job offers, marketplace deposits, loan app harassment, sextortion, and QR phishing.
Preservation Steps
What to capture, what to avoid sharing publicly, and how to prepare clean incident timelines.
Recovery Actions
What to do after being hacked, sending money, clicking a link, or receiving threats.
Observed Patterns
Recently observed scam wording, impersonation techniques, and account takeover tactics.
Database
Scam Database
Threat Insights
Threat Insights
Real-world cyber threats, scam patterns, and digital safety awareness.
Awareness
Scam Types
Reports
Report Builder
Report summary
Complete the form to generate a clear incident summary.
Emergency
Emergency Actions
Freeze account
Open your bank or e-wallet app, change PIN/password, revoke sessions, and call support.
Save evidence
Capture screenshots, transaction IDs, URLs, numbers, names, dates, and chat exports.
Report fast
Use the platform directory, then PNP/NBI/CICC/NTC/BSP where applicable.
Generate report
Use the report builder and export or print the incident summary for filing.
Learning center
Cyber Safety Resources
Educational guides and references for understanding scams, cybercrime terms, prevention habits, and safer online behavior.
Scam Explanations
Learn common scam patterns such as phishing, fake sellers, OTP scams, identity misuse, sextortion, and social engineering.
Safety Habits
Use practical checks before clicking links, sending money, sharing codes, installing apps, or trusting sender names.
Cybercrime Basics
Understand general cybercrime concepts, Philippine cyber-safety laws, and when facts need proper professional review.
Trusted Sources
Browse public references from official agencies, cyber-safety organizations, and recognized reporting resources.
Official and public references
Trusted Sources
Official laws, agencies, cyber-safety references, and recognized reporting resources used for safer public guidance.
OSINT & evidence utilities
Investigation Resource Links
Optional external tools for open-source research, IP lookup, intelligence search, and checksum verification. Use them lawfully and avoid submitting unnecessary personal data.
Reporting & Action Guide
Report Center
Action tools for reporting, preserving evidence, finding offices, preparing takedown requests, and responding during the first hour.
Reporting Directory
Find platform, bank, e-wallet, telco, marketplace, and provider reporting paths.
Cybercrime Office Directory
Search PNP ACG regional units and cyber response offices after choosing an office group.
What to do in the first hour
Preserve evidence, secure accounts, stop further loss, and choose the right reporting path.
Digital Evidence Checklist
Prepare screenshots, URLs, references, account details, timelines, and safe copies.
Report & Takedown
Use official report links for phishing, scams, harmful content, and dangerous sites.
Report & Drafting Templates
Generate support, takedown, evidence-preservation, complaint, and report-preparation drafts.
Provider reports
Service Provider Reporting Directory
Find reporting channels for banks, e-wallets, telcos, marketplaces, platforms, and digital services.
Reporting Directory Disclaimer: Contact details and procedures may change. Always verify through official websites or direct contact before filing or visiting.
Complaint lodging
Cybercrime Office Directory
Find PNP ACG regional units, provincial cyber response teams, and district anti-cybercrime teams before going to the appropriate office.
Choose an office group to view available cybercrime reporting offices.
Before visiting
This directory is provided for user convenience. Contact details, procedures, and office availability may change. Always verify through official websites or direct contact before filing or visiting.
Victim legal guide
What to do in the first hour
Preserve evidence
Take screenshots, export chats where possible, save URLs, phone numbers, account names, transaction IDs, dates, and times.
Secure accounts
Change passwords, revoke sessions, enable MFA, freeze cards or wallets, and contact your bank or e-wallet support immediately.
Report to authorities
For Philippine victims, report cybercrime incidents to PNP ACG or NBI. GCash also advises scam victims to report to PNP or NBI, then file with GCash support.
Do not negotiate blindly
If blackmail, extortion, or child-safety issues are involved, prioritize immediate authority reporting and avoid sending more money or private material.
Child Safety Notice: Do not upload, forward, repost, store, or share explicit images or videos involving minors. Preserve safe details only, such as usernames, links, dates, platform names, and screenshots that do not spread illegal material. Report immediately to the proper authority.
This guide is educational and informational only. Reporting channels and legal requirements can change, so verify details before filing.
Evidence handling
Digital evidence checklist
For real investigations, follow agency procedure, lawful authority, and forensic chain-of-custody rules. This checklist is for awareness and first-response preparation.
Report & Takedown
Report & Takedown
Platform reporting directions for phishing, scams, abuse, and dangerous websites.
Cyber Sentinel cannot guarantee takedown approval, account restoration, recovery of funds, or enforcement outcome.
Templates
Report & Drafting Templates
Draft-only templates for reporting preparation. Legal, court-related, and authority-facing documents must be reviewed by an authorized professional or proper office before use.
Draft
Draft only. Do not treat generated affidavits, complaints, WDCD/WSSECD references, or preservation requests as official, filed, issued, or legally sufficient without human review.
Choose a template and add details.
Trust
Trust Center
Understand what Cyber Sentinel is, what it can help with, and where its limits are.
Independent cyber-safety tool
Cyber Sentinel is an AI-assisted awareness and reporting-preparation platform. It is not a government, law-enforcement, bank, telco, platform, or e-wallet service.
Help users act safely
The platform helps users recognize scam patterns, preserve evidence, organize incident facts, and find safer reporting paths.
Guidance, not official findings
AI outputs are informational risk assessments. They are not legal advice, official investigations, law-enforcement determinations, or guarantees of recovery.
Minimize sensitive data
Users should avoid uploading OTPs, passwords, PINs, private keys, government IDs, bank credentials, intimate images, or unnecessary private files.
Responsible use
Cyber Sentinel discourages doxxing, harassment, unsupported accusations, malware sharing, child exploitation content, and misuse of reporting tools.
Verify through official channels
Directories and references are convenience guides. Contact details, procedures, and platform policies can change, so users should verify before filing.
Before Real Cases or Office Templates
Cyber Sentinel is suitable for beta testing with fake or sanitized samples. Real complainant files, office templates, affidavits, IDs, evidence, and WDCD-related drafts should be used only after these controls are reviewed.
- No API keys, passwords, .env files, database exports, or real evidence in GitHub.
- Use sanitized template samples first; remove names, phone numbers, addresses, case numbers, account IDs, and signatures.
- Require human review for affidavits, blotters, WDCD, WSSECD, preservation requests, subpoenas, and court-related drafts.
- Add consent, privacy notice, retention/deletion rules, access roles, and audit logs before real complainant data.
- Store real files only in private server-side storage with owner-based access, not in the public website repo.
User feedback and partners
Help Improve Cyber Sentinel
Share experience feedback, report confusing workflows, suggest improvements, or prepare a careful partnership inquiry. Do not include passwords, OTPs, IDs, private evidence, or sensitive case files.
Awareness partnership message
Good day,
I am developing Cyber Sentinel, an AI-assisted cyber awareness and scam guidance platform focused on helping users recognize online threats, organize evidence, and prepare safer reporting summaries.
I would like to explore a possible awareness partnership with your organization through a cyber safety orientation, pilot feedback session, or educational collaboration.
This is not a request for official endorsement. The goal is to support cyber awareness, gather responsible feedback, and help communities better understand online scams and digital safety.
Thank you.
Account
Security Center
Guest Mode
Guest users can check scams and read guides. Saved reports, private storage, team tools, and paid workflows are beta features that require review before production use.
Freemium beta
Guest Daily Limits
Guests can test the core value first. After the free limit, a sponsor-message pass can unlock a small extra preview for the day. Premium is intended for regular case, drafting, upload, and export workflows.
0 extra sponsor passes available today.
Guest Preview
Guests can use public safety checks and awareness materials with daily limits. Create an account to save basic account-linked activity.
Registered User Area
Registered users can keep basic account access, request reviewed upgrades, and use account-linked features that are available in the current beta.
Personal Beta Area
Personal Beta access unlocks expanded AI previews, additional upload/document reviews, case-preparation guidance, saved draft workflow, and export preparation while beta controls are reviewed.
Organization Pilot Area
Organization Pilot access unlocks reviewed organization workflow previews, office templates, staff materials, documentation reminders, and team-review planning.
Free Plan
Free beta accessBasic scam checker, limited Sentinel AI questions, limited smart reviews, one upload-analysis preview, one case-preparation preview, awareness tools, public alerts, and public directories.
Personal Beta Tools
Pricing to be announcedRequest reviewed Personal Beta access for expanded beta tools. Details appear after approval.
Organization Pilot
Pilot pricing by approvalRequest reviewed Organization Pilot access for organization workflows. Details appear after approval.
Cyber Sentinel is currently in beta. Registered User access is free, while Personal Beta and Organization Pilot access are reviewed before activation as pricing, privacy controls, and production support are finalized.
Beta status
Planned account features need review first
Saved reports, templates, reminders, OCR history, export tools, and organization workflows are convenience features only. They must not be used for real complainant data until privacy controls, access roles, audit logs, private storage, and human-review gates are in place.
For schools
Cyberbullying awareness, phishing education, student safety materials, and safer reporting guidance for school communities.
For small businesses
Scam prevention, employee awareness, fake supplier detection, payment fraud guidance, and safer vendor verification habits.
For organizations
Incident documentation, awareness materials, staff reporting workflow drafts, policy templates, and recurring cyber safety reminders after pilot review.
For law offices or consultants
Evidence organization support, client intake summaries, cyber incident timeline drafting, and report-ready fact organization.
Developer preview
Legal Knowledge Sources
Admin-only legal source controls for retrieval testing. Hide or protect this section before public production use.
| Source name | URL | Category | Last synced | Status | Indexed |
|---|
Legal RAG is seeded locally and can be connected to scheduled public-source syncing.
Saved reports
Keep generated report summaries and export them when needed.
Saved OCR history
Review extracted screenshot/PDF text and risk notes from previous scans.
Saved assessments
Store incident assessments, evidence checklists, and timeline notes.
Watchlist management
Track suspicious domains, sender names, wallet handles, and impersonation indicators.
Privacy controls
Manage saved data, notification settings, export center, and AI activity history.