Grooming Pattern Library
A searchable database of anonymized grooming conversation patterns. Learn to recognize the tactics predators use online.
The Grooming Pattern Library is populated by verified hunters who submit real, anonymized examples of predator behavior. Below are educational examples that illustrate common grooming tactics across platforms.
Are you a verified hunter?
Submit patterns from your cases to help parents recognize grooming tactics.
Isolation & Platform Switching
The predator immediately probes for age, then attempts to move the child off-platform to an unmonitored space. When the child references parental boundaries, the predator undermines parental authority and normalizes secrecy. This pattern of moving conversations to less-monitored platforms is one of the most common early grooming steps.
Love Bombing & Gift Offering
Classic love bombing pattern: excessive flattery targeting emotional vulnerability ("no one ever says that"). The predator escalates quickly to a gift offer that requires personal information like a home address. The secrecy request ("dont tell anyone") is a key grooming marker designed to create a private bond and test the child's willingness to keep secrets from trusted adults.
False Authority & Secrecy
The predator poses as an industry professional to exploit the child's desire for social media growth. Offering to help "go viral" is a modern gift offering tactic. The request for a phone number moves communication off-platform, and the secrecy request is framed as protecting a business opportunity rather than hiding inappropriate contact.