Mapping the Supply Chain of a Scam Betting Site: DNS, Hosting, and Payment Traces
investigationpaymentsfraud

Mapping the Supply Chain of a Scam Betting Site: DNS, Hosting, and Payment Traces

UUnknown
2026-03-08
11 min read
Advertisement

A 2026 technical tutorial to trace scam betting sites from DNS to payments, with reproducible commands and takedown playbooks.

Mapping the Supply Chain of a Scam Betting Site: DNS, Hosting, and Payment Traces

Hook: When a branded site or affiliate loses search traffic overnight, the root cause is often less SEO and more criminal infrastructure — domains, CDNs, hosting pools and payment rails that funnel ill-gotten revenue. This guide shows security, SEO and marketing teams exactly how to map a scam betting site's supply chain from DNS to payments so you can disrupt operations and stop revenue.

The inverted-pyramid: what you need first

In 2026 the fastest way to stop a scam betting operation is to target the revenue and trust anchors: the merchant acquiring relationships, payment endpoints, and registrar/hosting accounts that keep pages and checkout flows live. Below you’ll find a reproducible workflow with commands, tools, investigative pivots, and templates for abuse reports and law enforcement referrals.

  • Payments-first enforcement: Since late 2024 and through 2025 the major processors tightened AML and merchant onboarding for gambling verticals; in 2026, acquirers now proactively block suspicious merchant IDs and respond faster to trace requests.
  • Ephemeral infrastructure: Scam operators increasingly use short-lived cloud functions, serverless deployments, and on-demand VPS instances. That makes snapshotting DNS and certificates essential — the historical records are often the only attribution artifacts.
  • Crypto rails mixed with fast fiat rails: Scammers hybridize card payouts, crypto onramps, and alternative PSPs. Chain analysis tools are more accessible, but scammers use mixers and privacy coins to obfuscate flows.
  • Automated takedown pipelines: Brands and platforms (including major registrars and blocklist providers) now expect structured evidence packages in 2026. Reports without technical artifacts are ignored.

Core investigative principles

  1. Evidence first: capture live HTTP/HTTPS traffic, certificates, headers and POST payloads — don’t rely only on screenshots.
  2. Pivot extensively: DNS → certs → IPs → ASN → hosting provider → payment endpoints → merchant/acquirer → bank / crypto rails.
  3. Preserve history: use passive DNS and certificate transparency logs to recover domains or subdomains that were taken down.
  4. Correlate, don’t assume: use multiple sources (passive DNS, Shodan/Censys, transaction evidence) before escalating to law enforcement.

Step 1 — Rapid data capture (first 30 minutes)

When you discover a scam betting site (live or in search), collect volatile evidence immediately. Operators rotate services quickly — a 30–60 minute window is typical.

What to capture

  • Full-page screenshot and HTML source (save the HTML, not only an image).
  • Browser network capture (HAR file) — includes XHRs, POST endpoints and cookies.
  • TLS certificate (export using the browser or openssl).
  • Whois and registrar response snapshot.
  • Page headers and server responses (curl -I and curl -v).

Practical commands

curl -v -L -A "Mozilla/5.0" https://scamsite.example/ -o page.html
# export cert
openssl s_client -connect scamsite.example:443 -showcerts > certs.pem
# headers and redirects
curl -I -L https://scamsite.example/
# save HAR using browser DevTools

Step 2 — DNS mapping (passive + active)

DNS is the fastest pivot. Use both active DNS queries and passive historical sources to reveal sibling domains, name servers and registrar relationships.

Active lookups

# A, AAAA, NS, MX
dig +noall +answer A scamsite.example
dig +noall +answer NS scamsite.example
# full trace
dig +trace scamsite.example
# check TXT (SPF/DMARC can leak sender links)
dig +noall +answer TXT _dmarc.scamsite.example

Passive pivots

  • Certificate Transparency (crt.sh) — find other domains using the same certificate or SAN entries.
  • Passive DNS (SecurityTrails, VirusTotal, PassiveTotal) — find historical A-records and related hostnames.
  • Registrar WHOIS history (DomainTools / WHOIS history) — registrant email reuse signals.

Key signals to extract

  • Shared name servers or glue records — often reveal registrar or DNS provider preferences.
  • Certificate SAN clusters — the same cert used across many fraudulent domains.
  • Wildcard DNS or fast-flux patterns — indicators of botnet or CDN abuse.

Step 3 — Hosting & infrastructure pivoting

From the resolved IPs, escalate to ASNs, providers and service fingerprints.

IP & ASN lookups

# resolve IP
dig +short scamsite.example
# reverse lookup
host 198.51.100.12
# whois for IP/ASN
whois 198.51.100.12
# find ASN
bgp.he.net/ip/198.51.100.12 (or use ipinfo.io)

Service discovery

  • Shodan / Censys: search by IP for exposed services and other domains sharing the host.
  • Reverse HTTP Host header discovery: many hosts are virtual-hosted; other sites on the same IP may be legitimate and can provide supplier clues.
  • Traceroute: reveals transit providers and potential interconnects (helpful for abuse escalations).

What to do with hosting results

  1. Identify the hosting provider and the abuse portal or abuse@ contact.
  2. Collect timestamps, logs (as available) and the specific server/VM identifier.
  3. Search for other scam domains in the same IP range — these are often part of the same operation.

Step 4 — Tracing payment endpoints

This is the revenue layer. Disrupt the payment rails and you starve the scam.

Inspect the checkout flow

  • Open the HAR file and look for POST endpoints, third-party JS and URLs that receive payment data.
  • Look for merchant platform fingerprints: checkout.stripe.com, paypal.com, squareup.com, adyen.com, checkout.com etc. These often include a merchant key or session ID in the URL.
  • For direct bank transfer instructions or manual payout pages, copy IBANs, bank names, and beneficiary details exactly.

Practical tips

  • When a page uses Stripe.js or PayPal SDK, the merchant ID or account email is often present in the JS initialization snippet.
  • Search the page source for merchant_id, client_id, payee, or recognizable gateway endpoints.
  • For crypto, copy wallet addresses and transaction hashes; use blockchain explorers (Etherscan, Blockchain.com, etc.) for first-hop tracing.

Example: extracting a Stripe merchant

# find embedded keys
grep -E "publishableKey|client_id|stripe" page.html -n
# check network calls for checkout sessions
jq '.entries[] | select(.request.url|test("stripe"))' file.har

Step 5 — Attribution and chaining to acquirers

Once you have merchant identifiers or payment endpoints, escalate to the payment processor and the acquiring bank.

How to find the acquirer

  • Merchant descriptors on receipts or refund emails can contain the acquirer name or MID (merchant ID).
  • Card network disputes (Visa/Mastercard) require the acquirer’s info; PSPs usually have abuse portals or legal-request processes.
  • For bank transfers, the IBAN/BIC directly gives the bank; use SWIFT/BIC lookup services to identify the institution.

What to include in a payment-focused abuse report

  • Exact URLs and timestamps when the payment was initiated.
  • Network capture (HAR) showing POST to the payment endpoint.
  • Extracted merchant identifiers, logos, or gateway fingerprints.
  • Evidence of fraud: false promises, refusal to pay, manipulated odds, etc.

Step 6 — Crypto tracing (if applicable)

Crypto introduces different tooling. The goal is often to identify exchange onramps or centralized custodians that accept withdrawn funds.

Free and paid chains

  • Public chains (Bitcoin, Ethereum) can be traced using explorers and address clustering heuristics.
  • Use Labels/OSINT (Etherscan labels, WalletExplorer) to see if addresses are tied to exchanges.
  • For privacy coins or mixers, look for known mixers (e.g., Tornado Cash pattern in older chains) or cross-chain bridges.

When to escalate to chain-analysis providers

If funds reach an exchange, a subpoena to that exchange (or an AML report to regulators) can identify the account. In 2026, many exchanges have faster compliance teams — include on-chain txids, timestamps, and related account metadata in your request.

Step 7 — Building an evidence package for takedowns

By 2026 registrars, hosting providers and payment processors expect structured evidence. Assemble a concise package to maximize response speed.

Minimum evidence package

  1. Executive summary (one paragraph): who you are and what you want (suspend domain, block MID, freeze funds).
  2. Technical artifacts: saved HTML, HAR file, certificate PEM, IP and ASN data, and HAR network calls for payment endpoints.
  3. Legal/articulable harm: proof of consumer harm, TOS violations, trademark misuse (if relevant).
  4. Suggested remediation: suspend domain, suspend merchant ID, sinkhole DNS, or notify card networks.

Sample abuse-line template (short)

To: abuse@hostingprovider.example Subject: Urgent abuse: scam betting site hosting on your IP 198.51.100.12 We report an active scam (online gambling fraud) hosted at https://scamsite.example. Attached: HTML snapshot, HAR file showing POST to payment gateway (checkout.gateway.example) and TLS cert PEM. Request: suspend the instance and preserve logs for 30 days for law enforcement. Contact: .

Step 8 — Operational disruption strategies

Beyond formal takedowns, there are pragmatic actions brands and SEO owners can take to reduce damage.

  • Blocklists: submit domains and IPs to major blocklists used by browsers, anti-phishing vendors, and email providers (Google Safe Browsing, Microsoft SmartScreen, PhishTank). Include technical artifacts.
  • Search deindex requests: if the scam steals your content or uses your brand in metadata, file DMCA and deindex requests with Google and Bing.
  • Affiliate network takedown: identify any affiliate tracking parameters (e.g., affid=123) and escalate to the affiliate network.
  • Payment disruption: request processors to suspend merchant IDs; require acquirers to freeze payouts pending investigation.

Case study: hypothetical "BetQuick" mapping (concise)

To illustrate, here’s a condensed fictional investigation that follows the workflow above.

  1. Discovery: SEO team finds sudden SERP rankings for "betquick-bonus[.]com" and high bounce. Snapshot HTML and HAR.
  2. DNS: crt.sh shows the TLS cert used also covers "betpromo[.]pw" and "fast-wins[.]site". Passive DNS shows A-records rotating across 198.51.100.0/24.
  3. Hosting: whois and bgp show ASN 64501, operated by "FastCloud Host" — abuse portal responsive within 24 hours when given HAR evidence.
  4. Payments: HAR shows POST to https://pay.gatewayx.com/session with parameter merchant=merch_ABC123. GatewayX confirmed via abuse form that merch_ABC123 is an active merchant and suspended payouts after evidence submission.
  5. Crypto: wallet shown on checkout was labeled on-chain as previously linked to a known cashout exchange; a compliance request to that exchange froze the exchange withdrawals pending legal process.
  6. Outcome: domain sinkholed by registrar, merchant suspended, affiliate links removed — organic traffic restored within weeks.

Reporting and law enforcement

When criminal activity crosses jurisdictions, coordinate with local law enforcement and specialist units (cybercrime, financial crime units). In 2026, many national CERTs and law enforcement units accept structured digital evidence and have direct liaisons with major payment processors.

What law enforcement usually needs

  • Preserved server logs (timestamps, IPs, session IDs)
  • Transaction artifacts (payment processor session IDs, txids, bank transfers or crypto tx hashes)
  • Chain-of-custody for evidence you collected

Advanced strategies and 2026 predictions

Looking ahead, investigators should prepare for:

  • Greater automation of abuse responses: expect registrars and major hosting providers to accept structured JSON evidence packages and to have APIs for takedowns (already piloted in late 2025).
  • Richer attribution via ML: AI-based clustering of domain, certificate and payment metadata will accelerate bulk suspensions. To be effective, your data should be structured for machine parsing.
  • Shift of cashout methods: as acquirers tighten policies, operators will move to more complex on/off ramps (P2P payments, gift cards, and non-custodial crypto). Focus on first-hop intermediaries.
  • Supply-chain targeting: blocking downstream suppliers (affiliate networks, template marketplaces, analytics providers that knowingly host fraudulent assets) will be a future enforcement vector.

Blocklists, monitoring and automation playbook

Operationalize detection and remediation across teams.

  1. Integrate passive DNS and CT monitoring into your security stack and alert on domains that mimic your brand.
  2. Automate HAR and certificate captures for any suspicious domains using headless browsers (Puppeteer) and store artifacts in an evidence DB.
  3. Maintain a list of abuse contacts and API endpoints for registrars, major hosts, payment processors and card networks.
  4. Use a playbook template for abuse reports (include a checklist of artifacts) and track responses to iterate on success rates.

Ethics, legality and safety

Always avoid interacting with payment credentials. Capture evidence passively; do not attempt to purchase or transfer funds. If you encounter possible victim data, follow local breach notification rules and coordinate with legal counsel.

Actionable takeaways

  • Detect early: use CT and passive DNS to find likely scam domains within hours of launch.
  • Capture evidence fast: HAR, certs PEM, and registrar WHOIS history are the three artifacts that most providers require.
  • Disrupt revenue: target merchant IDs, acquirers and exchange onramps; processors respond well to structured evidence in 2026.
  • Automate the workflow: instrument headless captures and abuse submission templates to scale takedowns.

Final notes

Supply-chain mapping turns scattered artifacts into a coherent narrative that platforms, hosts and banks can act on. In 2026, speed and structure are decisive — the faster you provide machine-readable, timestamped evidence, the higher the chance of a decisive takedown.

Call-to-action: If you’re fighting brand impersonation, content scraping or scam betting infrastructure, get sherlock.website’s investigation playbook and an automated evidence pipeline. Submit suspicious domains to our triage team or request a tailored forensic audit — start disrupting fraudulent revenue today.

Advertisement

Related Topics

#investigation#payments#fraud
U

Unknown

Contributor

Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.

Advertisement
2026-03-08T00:06:13.395Z