ScamBounce

Scam intelligence (FTC-derived feed)

ScamBounce can use consumer-reported unwanted call intelligence as one signal in its own risk scoring. That intelligence is derived from patterns reported in FTC unwanted call data and similar consumer-reported sources—not from live calls to your phone and not from ScamBounce listening to conversations.

What the data is (and is not)

How the Android app uses the feed

Public endpoints

The same deployment serves the marketing site and the api.scambounce.com hostname when that domain is attached to this Vercel project.

FTC-derived feed (JSON)
https://api.scambounce.com/ftc-feed.json
Health check
https://api.scambounce.com/api/health
(alias) https://api.scambounce.com/health

Daily refresh (Vercel Cron)

A scheduled job calls /api/refresh-ftc once per day (03:00 UTC). It pulls the latest FTC DNC reported-calls data, aggregates by originating number, and stores the JSON in Redis (TLS via UPSTASH_REDIS_URL) so /ftc-feed.json stays fast and cache-friendly. The job is not exposed without a secret.

Required environment variables

Manual run (GET or POST; replace token): curl -sS -X POST -H "Authorization: Bearer YOUR_CRON_SECRET" "https://api.scambounce.com/api/refresh-ftc"

Deployment verification (operators)

After deploy, confirm each URL returns valid JSON (HTTP 200, application/json):

Fallback seed on disk: public/ftc-feed.seed.json (served only when Redis has no feed yet or UPSTASH_REDIS_URL is unset). After backend regenerates a snapshot, you can copy it into that seed file for the next deploy, or rely on the daily refresh once env vars are set.

FAQ · Privacy Policy · Home