Scam Awareness Center

This comprehensive guide details all types of scams we've detected through our monitoring systems. Learn how to identify, avoid, and respond to various online scams targeting Discord users and beyond.

1 Support Impersonation

Description

Scammers pose as official support staff or bots from platforms like Discord, Steam, or other services, claiming account violations or verification requirements to trick users into compromising their accounts.

Primary Method

Direct messages or server communications from accounts mimicking official support, directing victims to fake login pages.

Characteristics

  • Usernames and profile images that resemble official support accounts or bots
  • Urgent messages about account violations or required verification
  • Pressure to act quickly to "prevent account suspension"
  • Links to external websites claiming to be official platform pages

How it Works

  1. Scammers create accounts that look official, often with similar usernames to platform support
  2. They message users claiming there's an urgent problem with their account
  3. They create a false sense of urgency about potential account suspension
  4. They direct victims to fake login pages that steal credentials
  5. Once credentials are entered, the scammer gains access to the victim's account

Protection Tips

  • Verify all communications through official channels
  • Remember that legitimate support will never ask for your password
  • Check the account sending the message (creation date, mutual servers)
  • Hover over links before clicking to see the actual destination URL

What to Do if You Become a Victim

  • Change your password immediately on the affected platform
  • Enable two-factor authentication if not already active
  • Check for unauthorized changes to your account
  • Report the scam account to the platform

2 Model Impersonation

Description

Scammers impersonate models or influencers, typically using stolen images of attractive women to lure victims with promises of free adult content before stealing credentials or spreading malware.

Primary Method

Direct messages offering free adult content, exclusive photos, or special access, directing victims to malicious links or sending infected files.

Characteristics

  • Accounts using stolen images of attractive individuals
  • Unsolicited messages offering free adult content or exclusive access
  • Claims about special giveaways or private content
  • Requests to visit external websites to "claim" content

How it Works

  1. Scammers create fake profiles using stolen images from real models or influencers
  2. They send unsolicited direct messages offering free adult content or exclusive access
  3. Victims are directed to fake login pages to "verify age" or "claim rewards"
  4. Alternatively, victims receive archive files containing credential-stealing malware
  5. Victim's credentials are stolen, or their device is compromised

Protection Tips

  • Be skeptical of unsolicited messages offering free content
  • Never download files from unknown sources
  • Don't click on links from strangers promising free content
  • Research the person contacting you (reverse image search can help identify stolen photos)

What to Do if You Become a Victim

  • Run a full system scan with reputable antivirus software
  • Change passwords for all accounts from a different, secure device
  • Remove any suspicious applications or extensions
  • Report the scam account to the platform

3 Telegram Fraud

Description

Scammers promote fake Telegram channels that promise exclusive content, cryptocurrency opportunities, or special access, but actually aim to steal credentials or financial information.

Primary Method

Advertising fake Telegram channels in Discord servers or direct messages, often impersonating legitimate channels.

Characteristics

  • Usernames and profile pictures identical to legitimate Telegram channels
  • Promises of exclusive content, investment opportunities, or crypto giveaways
  • High-pressure tactics to join immediately
  • Claims of limited-time offers or rapidly growing communities

How it Works

  1. Scammers create accounts mimicking legitimate Telegram channels
  2. They advertise these channels in Discord servers or through direct messages
  3. Victims join the fake channels expecting exclusive content or investment opportunities
  4. In the channel, victims encounter phishing links, requests for cryptocurrency deposits, or malware
  5. Victims lose credentials, cryptocurrency, or personal information

Protection Tips

  • Verify Telegram channels through official sources before joining
  • Be skeptical of channels promising unrealistic returns or exclusive content
  • Research channel names and administrators before joining
  • Never send cryptocurrency or personal information to unknown channels

What to Do if You Become a Victim

  • Leave suspicious Telegram channels immediately
  • Block and report channels involved in fraudulent activity
  • Change passwords if you've shared any credentials
  • If you've sent cryptocurrency, document all transactions for potential reports to authorities

4 Fake Nitro Gifts

Description

Scammers offer counterfeit Discord Nitro subscriptions or similar premium service gifts, claiming to be part of special promotions or anniversaries to steal account credentials.

Primary Method

Messages from compromised accounts offering free premium services like Discord Nitro, directing victims to phishing pages that steal login information.

Characteristics

  • Messages about platform anniversaries or special events
  • Offers of free premium subscriptions (1-6 months)
  • Links to external websites for "claiming" the gift
  • Often sent from compromised friend accounts, increasing perceived legitimacy

How it Works

  1. Scammers use previously compromised accounts to contact potential victims
  2. They claim platforms are offering free premium subscriptions for special events
  3. They provide links to fake login pages that mimic official platforms
  4. Victims enter their credentials attempting to "claim" the free subscription
  5. Scammers capture login information and compromise the account

Protection Tips

  • Remember that legitimate gifts can be claimed directly within Discord
  • Be skeptical of unsolicited gift offers, even from friends
  • Verify offers through official platform channels
  • Check the URL carefully before entering any credentials

What to Do if You Become a Victim

  • Change your password immediately
  • Enable two-factor authentication
  • Log out of all sessions in your account settings
  • Check for unauthorized changes to your account

5 Phishing Websites

Description

Broad-based scams using fake login pages that promise free items, gift cards, or rewards but actually steal account credentials across various platforms.

Primary Method

Sending disguised URLs (often hidden with Markdown formatting) that lead to fake login pages mimicking legitimate platforms.

Characteristics

  • URLs hidden behind text using Markdown formatting
  • Promises of gift cards, in-game items, or other rewards
  • Messages often appear random and out of context
  • Usually sent from compromised accounts

How it Works

  1. Scammers send links to phishing websites, often disguising the URL
  2. The links lead to fake login pages that visually mimic legitimate platforms
  3. Victims enter their credentials, believing they're logging into the real service
  4. Scammers capture the credentials and use them to compromise accounts
  5. Compromised accounts are then used to spread the scam further

Protection Tips

  • Hover over links to see the actual destination before clicking
  • Check URL spelling carefully—scammers often use similar-looking domains
  • Access websites directly through official sources rather than clicking links
  • Use a password manager that won't autofill credentials on fake sites

What to Do if You Become a Victim

  • Change passwords immediately from a secure device
  • Enable two-factor authentication where possible
  • Check connected applications and remove any suspicious ones
  • Report phishing websites to Google Safe Browsing or other anti-phishing services

6 Crypto Fraud

Description

Scams that target cryptocurrency owners through fake giveaways, investment schemes, or fraudulent exchanges that steal funds and personal information.

Primary Method

Messages claiming victims have won cryptocurrency rewards that require identity verification and initial deposits to claim, with no actual possibility of withdrawal.

Characteristics

  • Claims of randomly selected winners for large cryptocurrency prizes
  • Requirements to create accounts on unknown exchanges
  • Identity verification requirements on suspicious platforms
  • Minimum deposit requirements to "unlock" withdrawals

How it Works

  1. Scammers contact victims claiming they've won cryptocurrency in a giveaway
  2. Victims are directed to create accounts on fake cryptocurrency exchanges
  3. The exchange shows the "prize" in the victim's account balance
  4. To withdraw, victims must verify identity and make a minimum deposit
  5. After depositing, withdrawal attempts fail or require additional payments

Protection Tips

  • Remember that legitimate cryptocurrency transactions don't require deposits to withdraw
  • Research exchanges thoroughly before creating accounts
  • Be skeptical of unsolicited messages about crypto prizes
  • Never send cryptocurrency to unknown individuals or platforms

What to Do if You Become a Victim

  • Document all communications and transactions
  • Report the fraud to local authorities and cybercrime units
  • Contact the cryptocurrency exchange used for deposits (if legitimate)
  • Report the scam to the platform where you were contacted

7 NSFW Discord Invites

Description

Scams involving invitations to Discord servers supposedly containing adult content but requiring "age verification" through malicious methods that steal account credentials.

Primary Method

Server invites from compromised accounts leading to fake verification systems that steal Discord credentials through phishing pages or QR code scanning.

Characteristics

  • Invites to servers claiming to have adult or leaked content
  • Age verification requirements upon joining
  • Fake verification bots or Discord captcha systems
  • QR codes that victims are asked to scan with their phones

How it Works

  1. Scammers send invites to servers supposedly containing adult content
  2. Upon joining, victims encounter "age verification" requirements
  3. Verification methods include logging into fake Discord pages or scanning QR codes
  4. These methods actually provide scammers with account access tokens
  5. Scammers gain complete control of the victim's Discord account

Protection Tips

  • Be skeptical of servers requiring external verification
  • Remember that legitimate Discord age verification doesn't require your password
  • Never scan QR codes from unknown servers (Discord QR codes are only for login purposes)
  • Verify server legitimacy before joining

What to Do if You Become a Victim

  • Change your Discord password immediately
  • Enable two-factor authentication
  • Revoke all authorized applications in Discord settings
  • Check for unauthorized changes to your account

8 Artwork Commissions

Description

Scams where individuals pose as artists offering commission work, collecting advance payments for artwork they never intend to deliver.

Primary Method

Direct messages from fake artist accounts showcasing stolen or AI-generated artwork to solicit upfront payments through non-refundable methods.

Characteristics

  • Random messages from "artists" looking for clients
  • Portfolios containing stolen artwork or AI-generated images
  • Requests for 50% upfront payment (typically under $100)
  • Insistence on using PayPal Friends & Family or other non-refundable payment methods

How it Works

  1. Scammers create accounts posing as new artists looking for work
  2. They showcase stolen artwork or AI-generated images as their portfolio
  3. They establish friendly communication to build trust
  4. They request upfront payments, specifically through methods that don't allow chargebacks
  5. After receiving payment, they disappear or make excuses about delays

Protection Tips

  • Research artists thoroughly before commissioning work
  • Reverse image search portfolio examples to check for stolen artwork
  • Use payment methods that offer buyer protection
  • Never use Friends & Family payment options with unknown individuals

What to Do if You Become a Victim

  • Contact the payment platform to attempt a dispute (though this may not be possible with Friends & Family payments)
  • Report the scammer to the platform where you were contacted
  • Document all communications for potential reports to authorities
  • Share information about the scammer in relevant communities to warn others

9 Adversarial Scrapers

Description

Sophisticated attacks involving dormant bot accounts that collect server messages and user information for targeted exploitation.

Primary Method

Creating inactive-appearing user accounts that automatically collect and analyze server communications over time.

Characteristics

  • Accounts that join servers but remain largely inactive
  • Minimal interaction with other users
  • Long-term presence in servers
  • Targeted at specific communities or individuals

How it Works

  1. Attackers create accounts using user tokens rather than bot tokens
  2. These accounts join servers and appear as normal users
  3. They automatically collect and store all messages and activities
  4. The collected data is analyzed for valuable information or vulnerabilities
  5. Information is used for targeted attacks, identity theft, or other malicious purposes

Protection Tips

  • Regularly audit server member lists for suspicious accounts
  • Implement verification systems for new server members
  • Be cautious about sharing sensitive information in public channels
  • Use role permissions to limit channel access for new or unverified members

What to Do if You Become a Victim

  • Remove suspicious accounts from your server
  • Change security settings to require higher verification levels
  • Alert server members about potential data collection
  • Consider creating new private channels for sensitive discussions

10 Rogue Developers

Description

Scams involving fake game developers who distribute malware disguised as beta tests or early access opportunities for new games.

Primary Method

Messages from compromised or fake accounts offering exclusive access to new games through executable files or archives containing malware.

Characteristics

  • Claims of being new game developers seeking testers
  • Offers of exclusive early access to unreleased games
  • Executable files or archives shared directly
  • Often target friends of compromised accounts to exploit trust

How it Works

  1. Scammers pose as game developers seeking players to test their games
  2. They share executable files or archives claiming to be game builds
  3. These files contain credential-stealing malware or ransomware
  4. When victims run the files, their systems or accounts become compromised
  5. Compromised accounts are used to target the victim's friends, exploiting trust networks

Protection Tips

  • Be skeptical of unsolicited game testing opportunities
  • Never run executable files from unknown sources
  • Verify developer legitimacy through official channels
  • Use sandboxed environments to test suspicious software

What to Do if You Become a Victim

  • Disconnect your device from the internet immediately
  • Run a full system scan with reputable antivirus software
  • Change all passwords from a different, secure device
  • Check for unauthorized account access or changes

11 Funpay Fraud

Description

Scams targeting gaming communities by selling fake or publicly available game keys on marketplaces with lenient refund policies.

Primary Method

Creating fake listings on platforms like Funpay for non-existent or freely available game keys, exploiting restrictive Terms of Service to prevent chargebacks.

Characteristics

  • Listings for unreleased or limited-access game keys
  • Focus on games with high anticipation or limited availability
  • Use of platforms with restrictive refund policies
  • Prices that seem reasonable but not suspiciously low

How it Works

  1. Scammers identify games with high demand or limited access
  2. They create listings on marketplaces like Funpay claiming to sell valid keys
  3. They exploit the platform's lenient ToS regarding refunds
  4. Victims purchase keys that are either fake, already used, or freely available
  5. When victims discover the fraud, they're unable to get refunds due to platform policies

Protection Tips

  • Purchase game keys only from official or well-established retailers
  • Research the seller's reputation and review history
  • Verify that the game is actually in a state where keys would be privately available
  • Use payment methods with buyer protection when possible

What to Do if You Become a Victim

  • Report the fraud to the marketplace platform
  • Document all communications and transactions
  • Dispute the charge with your payment provider if possible
  • Report the scam to the game developer/publisher

12 Game Cheat Invites

Description

Scams offering game cheats or hacks that actually contain malware, often requiring payment first and then stealing credentials when the "cheat" is installed.

Primary Method

Messages offering paid access to game cheats that contain credential-stealing malware, using compromised accounts to spread to more victims.

Characteristics

  • Offers of powerful or undetectable game cheats
  • Requires payment to access the cheat software
  • Targets popular competitive games
  • Often distributed by previously compromised accounts

How it Works

  1. Scammers advertise game cheats, often through compromised accounts
  2. Victims pay for access to the supposed cheat software
  3. The delivered software contains credential-stealing malware
  4. When victims run the cheat, their gaming and other accounts are compromised
  5. Newly stolen accounts are used to further advertise the fake cheat

Protection Tips

  • Avoid using game cheats entirely—they often violate terms of service
  • Never run cheat software from untrusted sources
  • Be skeptical of cheats requiring payment or account credentials
  • Research thoroughly before downloading any third-party game software

What to Do if You Become a Victim

  • Run a full system scan with antivirus software
  • Change passwords for all gaming and other accounts
  • Enable two-factor authentication where available
  • Check for unauthorized purchases or account changes

13 Emotional Manipulation

Description

A variation of romance scams where fraudsters build fake romantic relationships to manipulate victims emotionally and eventually extract money through fabricated emergencies or needs.

Primary Method

Direct messages initiating romantic relationships using stolen images and fabricated personal details, gradually building trust before requesting financial assistance.

Characteristics

  • Unsolicited romantic interest from strangers
  • Profile pictures of attractive individuals (stolen from social media)
  • Claims of having seen you in games or communities
  • Rapid emotional attachment and relationship development

How it Works

  1. Scammers create fake profiles using stolen images of attractive individuals
  2. They initiate conversation claiming to have noticed you in a game or community
  3. They build a relationship through regular communication and emotional manipulation
  4. They may use AI-generated voices or voice changers for fake calls
  5. Once trust is established, they request money for various reasons

Protection Tips

  • Be skeptical of romantic interest from strangers online
  • Reverse image search profile pictures to check authenticity
  • Verify identity through video calls (not just voice)
  • Never send money to online romantic interests you haven't met in person

What to Do if You Become a Victim

  • Cut off communication with the scammer immediately
  • Do not send additional money regardless of the story
  • Report the account to the platform where you were contacted
  • Report financial losses to local authorities and the FBI's Internet Crime Complaint Center

14 Gift Card Scams

Description

Scams that trick victims into purchasing gift cards and sharing the redemption codes under various pretexts, from fake job offers to impersonation of authority figures.

Primary Method

Creating urgent scenarios that require immediate payment through gift cards, often impersonating employers, government officials, or friends in need.

Characteristics

  • Requests for payment exclusively through gift cards
  • Claims of urgency that prevent normal payment methods
  • Impersonation of authority figures or employers
  • Elaborate stories about taxes, fees, or emergencies

How it Works

  1. Scammers contact victims posing as employers, government agencies, or friends in distress
  2. They create scenarios requiring immediate payment (tax problems, bail money, job training fees)
  3. They claim traditional payment methods aren't available due to "system issues" or urgency
  4. Victims are instructed to purchase specific gift cards from retail stores
  5. Victims share the redemption codes with scammers via phone or message

Protection Tips

  • Recognize that legitimate organizations never request payment via gift cards
  • Verify requests through official channels or known contact information
  • Be skeptical of urgent payment requests, especially from unfamiliar contacts
  • Remember that government agencies don't accept gift cards as payment

What to Do if You Become a Victim

  • Report the fraud to local law enforcement
  • Contact the gift card issuer immediately (though recovery is unlikely)
  • Report the scam to the FTC or appropriate agencies in your country
  • Save all communications and receipt information

15 Account Recovery Impersonation

Description

Scammers target individuals who have lost access to their accounts, posing as recovery specialists who can help regain access for a fee.

Primary Method

Responding to public posts about account access issues with offers to help recover accounts through "special tools" or "insider connections" for payment.

Characteristics

  • Unsolicited offers to help recover lost accounts
  • Claims of special tools or connections with platform staff
  • Requests for payment upfront, often in cryptocurrency
  • Promises of guaranteed recovery within short timeframes

How it Works

  1. Scammers monitor public posts about lost account access on forums and social media
  2. They contact victims offering specialized recovery services
  3. They claim to have insider connections or special tools unavailable to the public
  4. Victims are asked to pay upfront fees, typically in cryptocurrency or gift cards
  5. After payment, scammers either disappear or claim to need additional payments

Protection Tips

  • Only use official account recovery methods provided by platforms
  • Remember that legitimate companies never offer special recovery services for payment
  • Be skeptical of unsolicited recovery offers, especially on public forums
  • Verify the identity and credentials of anyone claiming to help

What to Do if You Become a Victim

  • Report the fraud to the platform where you were contacted
  • Document all communications with the scammer
  • Report financial losses to local authorities
  • Continue pursuing official recovery options through legitimate channels

16 Fake Job Offers

Description

Scams involving fabricated employment opportunities that request personal information, upfront payments, or participation in money laundering schemes disguised as legitimate work.

Primary Method

Posting seemingly legitimate job listings or contacting potential victims directly with offers that are too good to be true, requiring unusual application processes.

Characteristics

  • Remote positions with minimal qualifications but high pay
  • Requests for payment for training, equipment, or certification
  • Job interviews conducted entirely via messaging platforms
  • Unusual or premature requests for personal and financial information

How it Works

  1. Scammers create fake job listings or directly contact potential victims
  2. They conduct brief interviews via text or email without video verification
  3. Victims are quickly "hired" with minimal vetting
  4. New "employees" are asked to pay for training, background checks, or equipment
  5. Alternatively, victims are asked to process payments through personal accounts (money laundering)

Protection Tips

  • Research companies thoroughly before applying (verify contact information independently)
  • Be skeptical of jobs with high pay for minimal qualifications
  • Never pay money to secure a job opportunity
  • Insist on video interviews with verifiable company representatives

What to Do if You Become a Victim

  • Stop all communication with the scammer
  • Report financial losses to local authorities
  • Contact your bank if you've shared financial information
  • Report fake job listings to the platform where they appeared

17 Counterfeit Marketplace Listings

Description

Scams involving fake product listings on marketplace platforms that either never deliver the promised items or provide counterfeit goods.

Primary Method

Creating listings using stolen images of desirable products at competitive but not suspiciously low prices to avoid detection.

Characteristics

  • Prices that are discounted but not suspiciously cheap
  • High-demand or limited-availability items (gaming consoles, collectibles, etc.)
  • Stolen images from legitimate sellers or manufacturers
  • Vague product descriptions or specifications

How it Works

  1. Scammers create listings using stolen images of desirable products
  2. They price items competitively but not suspiciously low to avoid scrutiny
  3. They communicate just enough to seem legitimate but avoid detailed questions
  4. They pressure buyers to pay quickly, often citing "other interested buyers"
  5. After payment, they either ship counterfeit items or nothing at all

Protection Tips

  • Research sellers thoroughly (feedback, account age, review patterns)
  • Be wary of deals that seem too good to be true
  • Use marketplace platforms with strong buyer protection
  • Never complete transactions outside the platform's official payment system

What to Do if You Become a Victim

  • Report the fraud to the marketplace platform immediately
  • File a dispute with your payment provider
  • Document all communications and transaction details
  • Report counterfeit items to the brand being impersonated

18 Giveaway Scams

Description

Fraudulent contests and giveaways designed to collect personal information, spread malware, or extract payment from victims under the guise of taxes or fees for claimed prizes.

Primary Method

Creating fake contests or giveaways for desirable prizes that require participants to provide personal information, share with friends, or pay small fees to claim winnings.

Characteristics

  • Extremely valuable prizes (latest technology, vacations, vehicles)
  • Minimal entry requirements compared to prize value
  • Claims of being sponsored by well-known companies
  • Requirements to share personal information or contact details

How it Works

  1. Scammers create fake giveaway announcements for desirable prizes
  2. They collect entries containing personal information
  3. Participants are often required to share the giveaway, expanding the scam's reach
  4. "Winners" are notified regardless of actual participation
  5. To claim prizes, winners must pay fees for shipping, taxes, or processing

Protection Tips

  • Verify giveaway legitimacy through official company channels
  • Be skeptical of prizes that seem disproportionate to entry requirements
  • Remember that legitimate giveaways never require payment to claim prizes
  • Research contest organizers thoroughly

What to Do if You Become a Victim

  • Stop all communication and don't send additional payments
  • Report the scam to the platform where it was advertised
  • Report impersonated companies or celebrities to the platforms
  • Change passwords if you've shared account information

19 Malicious QR Codes

Description

Scams that use manipulated QR codes in public places or online to direct victims to malicious websites that steal credentials or install malware.

Primary Method

Replacing legitimate QR codes or creating new ones in public spaces that lead to convincing phishing sites or trigger automatic downloads.

Characteristics

  • QR codes in high-traffic public areas (restaurants, parking meters, tourist spots)
  • Codes overlaid on legitimate advertisements or notices
  • QR codes sent through direct messages with vague descriptions
  • Claims about exclusive content or special offers accessible only via QR

How it Works

  1. Scammers create malicious QR codes that lead to fraudulent websites
  2. They place these codes in public spaces or send them directly to victims
  3. When scanned, codes direct victims to convincing phishing pages
  4. Victims enter login credentials or payment information on these fake sites
  5. Some malicious QR codes may trigger automatic malware downloads

Protection Tips

  • Use QR scanning apps with preview features that show the destination URL
  • Be suspicious of unexpected or unexplained QR codes
  • Verify the URL before proceeding to any website from a QR code
  • Never enter credentials or payment information on sites accessed via unexpected QR codes

What to Do if You Become a Victim

  • Change passwords for any accounts accessed through suspicious QR codes
  • Run security scans on devices used to scan suspicious codes
  • Report tampered QR codes to the business or location where they were found
  • Monitor financial accounts for unauthorized transactions

20 Streaming Service Phishing

Description

Scams targeting users of popular streaming platforms with fake billing issues or account verification requirements to steal payment information and account credentials.

Primary Method

Sending emails or messages claiming payment problems or suspicious activity on streaming accounts, directing victims to fraudulent websites mimicking legitimate services.

Characteristics

  • Emails or messages about account suspension or payment problems
  • Warnings about unusual login activity requiring verification
  • Threats of immediate service cancellation without action
  • Links to convincing replica login pages for popular streaming services

How it Works

  1. Scammers send messages impersonating popular streaming services
  2. They claim urgent account issues requiring immediate attention
  3. Links in messages lead to highly convincing fake login pages
  4. Victims enter account credentials and payment information
  5. Scammers capture this information for account takeover and financial fraud

Protection Tips

  • Access streaming services directly through official apps or by typing the URL
  • Be skeptical of emails about account problems—check your account directly
  • Hover over links to verify destinations before clicking
  • Check sender email addresses carefully for slight misspellings

What to Do if You Become a Victim

  • Change passwords for affected streaming accounts immediately
  • Update payment information in your legitimate account
  • Contact your credit card company if you shared payment details
  • Report phishing attempts to the impersonated streaming service

Additional Resources

For more information about online scams and how to protect yourself, check out these trusted resources:

FTC Scam Alerts

The Federal Trade Commission provides up-to-date information about current scams.

Visit FTC Scam Alerts

Discord Safety Center

Official Discord resources for staying safe on the platform.

Visit Discord Safety

FBI Internet Crime Complaint

Report internet crimes to the FBI's Internet Crime Complaint Center.

Visit IC3

Important Links

Key resources and guidelines below