CantHide

Grooming Pattern Library

A searchable database of anonymized grooming conversation patterns. Learn to recognize the tactics predators use online.

The Grooming Pattern Library is populated by verified hunters who submit real, anonymized examples of predator behavior. Below are educational examples that illustrate common grooming tactics across platforms.

Are you a verified hunter?

Submit patterns from your cases to help parents recognize grooming tactics.

Example Pattern

Isolation & Platform Switching

Gaming PlatformsIsolationAge Probing
hey nice avatar lol how old r u?
thanks! im [AGE]
cool cool. do u have [OTHER APP]? its easier to talk there without all the other ppl
idk my mom said i shouldnt give that out
lol ur mom doesnt need to know everything. its just easier to chat there
Tactic Breakdown

The predator immediately probes for age, then attempts to move the child off-platform to an unmonitored space. When the child references parental boundaries, the predator undermines parental authority and normalizes secrecy. This pattern of moving conversations to less-monitored platforms is one of the most common early grooming steps.

Educational example — not from a real submission
Example Pattern

Love Bombing & Gift Offering

Social MediaLove BombingGift Offering
youre literally the most talented person ive ever seen on here. like seriously
omg thank u so much!! no one ever says that
i mean it. you deserve so much more. hey i want to send you a gift. whats your address?
wait really?? thats so nice
of course. but dont tell anyone ok? they might get jealous
Tactic Breakdown

Classic love bombing pattern: excessive flattery targeting emotional vulnerability ("no one ever says that"). The predator escalates quickly to a gift offer that requires personal information like a home address. The secrecy request ("dont tell anyone") is a key grooming marker designed to create a private bond and test the child's willingness to keep secrets from trusted adults.

Educational example — not from a real submission
Example Pattern

False Authority & Secrecy

Video PlatformsGift OfferingSecrecy Requests
ur content is fire. u deserve way more followers
thanks!! im trying to grow my account
i can help u go viral. i work in the industry and know how the algorithm works
omg really?? that would be amazing
ya but we should talk somewhere private. whats ur number? and dont post about this
Tactic Breakdown

The predator poses as an industry professional to exploit the child's desire for social media growth. Offering to help "go viral" is a modern gift offering tactic. The request for a phone number moves communication off-platform, and the secrecy request is framed as protecting a business opportunity rather than hiding inappropriate contact.

Educational example — not from a real submission