How I Mapped an International Pig Butchering Network Using Public Tools

Marco Altomare
A real-world case study in passive threat intelligence and open-source investigation . Disclaimer: This research was conducted exclusively for educational purposes and passive threat intelligence . No systems were breached, no credentials were used without authorization, and no sensitive identifying data is reported in this article. All information collected comes from publicly accessible sources : Shodan, public paste sites, blockchain explorers, and OSINT forums. Sensitive details such as IPs,