top of page

#OpChildSafety: Join the Fight to Stop Child Predators

Join our Telegram Channel here

Follow me on Twitter here

Child predators have been constantly present throughout all of history but in the last 100 years, we have finally gained access to the science needed to document just how much this epidemic plagues our society.

At this point in time, our criminal system is overrun with predators and the volume has reached beyond our legal justice system’s means.

Ruminate on this: There are approximately 35,000 FBI agents. However, according to one statistical report by Screen and Reveal, there are as many as 500,000 child predators on the web who pose a threat to children daily. Simply, there are just not enough FBI agents to combat so many threats as they’re happening.

This is where you come in.

They also reported that one in 25 children will fall prey to manipulation leading to physical contact within a year. But for those of us who are predator hunters, we can tell you that pedophiles will start grooming underage persons for physical contact within their very first online conversation.

This guide will describe the tools we use to hunt, lure, and identify online sexual predators; and ultimately how we stop them. Confronting predators in real life can be dangerous. You don’t know if they have a weapon or what they might do to keep their crimes from getting out.

Then, there’s the justice side of things. We’re not the law. We’re the defenders of the innocent so don’t be blinded by your rage. Instead, harness your passion productively by hunting the predators and exposing their most protected secrets.


That's right. Law enforcement does not want your help, no matter how disadvantaged they are. That's because it's considered entrapment. This entails tricking or attempting to trap someone into committing a crime.

Only the government is allowed to incite or implant the idea to commit a crime, which they do frequently. But trust me, if you're reading this, chances are you're not going to wait on law enforcement to do their job, especially when your failure to identify the child predator could mean that an abuser will continue to harm a child.

This is where you say, "Wait, so you're telling me it's against the law to try to stop people like this?" If you're posing as an underage person - yes. That doesn't mean the law is right.

But let me put it to you this way: law enforcement doesn't know about this 41-year-old man from Oregon. You do. He approached you, with the intent to sexually entice you, a minor because your screenname suggested you are underage.

In the words of Martin Luther King Jr., "One has not only a legal, but a moral responsibility to obey just laws. Conversely, one has a moral responsibility to disobey unjust laws."

Step 1: Create the Bait

This step is optional. Predators are going to want some proof that you’re underage. So, before you hit the chats and being your operation, it’s good to have something to validate yourself.

For this step, we’re going to use FaceApp. It’s available on the Google Play and Apple App store. You can take a picture of yourself, and using the age feature, change the look of your face to adolescent age if you don’t look within that age range already.

If you’re male, you can use the gender option, to swap your gender to female, then use the age feature to roll back your age to appear younger. WE DO NOT use images of other people. That is the cardinal rule in these operations.

Step 2: OPSEC

You’re going to want to protect your online identity - always, and be careful not to mix and use your personal accounts with your OpChildSafety accounts. Keep them separate.

  • Create the bait

  • Use a Virtual Private Network (VPN)

  • Create a burner Gmail account

  • Download the TextNow app

Predators will oftentimes ask you if you use Google Hangouts aka Google Chat, Kik Messenger, and Snapchat. But what we want to do is not give them control over their preferred messenger platform. Rather, we want to lure them away from the comfort of those platforms, and onto platforms that give us control.

Step 3: The Hunting Grounds

The following chat sites are known among pedo hunters for attracting many predators. Be sure to bookmark these sites, the first being the most prolific in attracting predators.

Step 5: The Right Screename is Half the Work

A person with the screenname SecksiLaura14f at first glance appears to belong to a 14-year-old female named Laura. Mistybaby16, LuvLace15f - are all screen name ideas that broadcast to the chatroom that the user is female and underage.

Without doing a thing, you should start seeing messages come in from older men and women. This is the first phase of what is purely a social engineering operation.

After this happens, I personally only focus on targets in the United States, simply because of the convenience and accessibility of public records. Also, I don't focus on targets from age 18 to 19, but rather, 20+

Step 6: Initiate & Control

While the focus of this article is not to teach you, dear reader, how to social engineer, the goal of your engagement with the target is ultimately to direct him/her to reveal personal information about themselves. In turn, you can use the information to identify who they are.

You achieve this by driving your conversations away from the chat platform and onto TextNow, a free Voice-Over-IP phone, and messaging app. Android users have a feature that allows them to save conversations, which is a huge convenience for evidence collecting.

After you give them your TextNow phone number, they’ll usually text you without delay. This is where the real magic beings.

However, sometimes your target is going to have really good OPSEC. They might also use a VoIP number, or only agree to use ProtonMail, SnapChat, Email, etc. If the nature of that particular target is worth it to you, play the long game and keep at it. If not, move on to the next target.

Step 7: De-Anonymize The Target

There are many ways to unmask the identity of the target. If they give you a phone number, you can search the number in any public records database to obtain the name and address of who it's registered.

A simple Google search for the number can also yield results. However, as useful as public records are, sometimes there's a lot of metadata left over from previous owners of the number. You must fact-check each returned result to ensure you have the current information for your target.

Step 7: Extracting Geolocation Data

If the target offers pictures, depending on where it was sent, you can try to extract geolocation data using

This should yield latitude and longitude data, which will indicate where the picture was taken, and most likely where the target is

Step 8: IP Logging the Target

Execute this phase before directing the target to your TextNow number. Since Chatib disabled its image upload feature, upload an image to Unsee. It will generate a URL to the image.

Then navigate to Grabify IP Logger and copy/paste the Unsee URL to your uploaded image.

On the far right corner, select Change domain/Make a custom link and change the domain name of your IP logging redirect link from Grabify to something less suspicious.

You will be given a new URL to send to the target. In this case, but since Chatib will prevent sending links, simply remove the https:// part and send the rest to the target.

Once the link is clicked, the URL will redirect the target to the image you uploaded on Unsee. The IP will be logged, and you will be able to view it on Grabify.

Step 9: Reverse Image Search

If you received an image from the target that shows his/her face, the next phase of the operation is a reverse image search. The following are facial recognition search engines that can help you find where these same images have been uploaded, i.e., Facebook. And you know if you find the target on Facebook, it's game over.

Step 10: Breach Report Database Searches

If you've obtained a name, an email address or a phone number, any of these can be searched in a breach report database, which can yield interesting results.

Email addresses can reveal leaked passwords, and any of these can expose personal information you can use to build a dox against your target.

Step 11: Compile and Corner

Hacking the targets isn't our goal. While evidence obtained illegally by a non-law enforcement person is admissible in a criminal proceeding, it isn't necessary.

The target's conversation with you alone, the "undercover 15-year-old", constitutes sexual enticement of a minor. It's enough. That's a prison sentence ranging anywhere from 10 years to life.

Obtain the target's personal information. You may need to obtain the target's family information if you can. Employment information from social media, such as LinkedIn.

You can use this information to confront the target online, ripping off the mask and revealing that he/she has just been subject to a sting operation.

The target will either block you, be so shocked that they can't believe it, or cry profusely, begging you not to expose them to their wife/husband, boss, family, or the FBI.

Step 12: Report

You can report the crime at However, don't expect the FBI to read your report, and arrest the person.

Another avenue is to contact the target's local police department. However, they may have you go online and fill out a report, and MAYBE pass it along to the FBI. You won't actually know if your report gets escalated.

When law enforcement isn't in a position to assist, we keep the target under our surveillance. We try to control the situation until law enforcement can act.

Because we possess evidence of the crime committed, if they're smart, they will comply and be on their best behavior. If they block us, we leak the evidence to family and their place of employment.

Be smart. Be passionate, but don't take the operation personally. If you do, it will negatively impact you emotionally. This takes a lot of strength and determination from start to finish.

Happy hunting.

Authored by W1ntermute

380 views0 comments


Rated 0 out of 5 stars.
No ratings yet

Add a rating

Download Google Dork Lists - View Free Educational/Training Resources

bottom of page