I. Introduction
Fake Instagram accounts are common in the Philippines and may be used for harassment, impersonation, scams, blackmail, cyberbullying, defamation, identity theft, stalking, phishing, sextortion, or the unauthorized use of another person’s photos and personal information. While some fake accounts are merely parody or anonymous commentary, others cross the line into unlawful conduct.
This article explains, in the Philippine legal context, how a person may report, preserve evidence, and pursue the tracing of a fake Instagram account. It also discusses the relevant laws, agencies, remedies, evidentiary considerations, and practical limits involved.
This is general legal information, not legal advice for a specific case.
II. What Is a “Fake Instagram Account”?
A fake Instagram account may refer to several different things:
Impersonation account An account pretending to be a real person, business, public official, school, organization, or brand.
Dummy account An account using a false name or identity, often to hide the real user.
Scam account An account used to solicit money, investments, purchases, donations, job fees, romantic payments, or other benefits through deception.
Harassment account An account used to send threats, insults, malicious messages, stalking content, or repeated unwanted contact.
Defamatory account An account posting accusations, edited images, malicious captions, or statements that damage a person’s reputation.
Blackmail or sextortion account An account threatening to release private images, videos, messages, or personal information unless the victim pays money, sends more images, or complies with demands.
Identity theft account An account using another person’s name, photos, personal details, or identity to mislead others.
Phishing account An account pretending to be Instagram, a bank, a government agency, a delivery company, or another trusted entity to steal login credentials, one-time passwords, personal information, or financial data.
Not every anonymous or pseudonymous account is illegal. The legal issue usually depends on what the account does: impersonation, fraud, threats, defamation, harassment, privacy invasion, or other harmful conduct.
III. Applicable Philippine Laws
Several Philippine laws may apply depending on the facts.
A. Cybercrime Prevention Act of 2012 — Republic Act No. 10175
The Cybercrime Prevention Act is the main Philippine law covering crimes committed through computers, the internet, social media, and digital platforms.
Fake Instagram accounts may involve cybercrime when used for:
1. Computer-related identity theft
Using another person’s identifying information online without authority may fall under computer-related identity theft. This may apply when the fake account uses the victim’s name, photos, contact details, or other identifying information to make others believe the account belongs to the victim.
2. Computer-related fraud
A fake account used to deceive people into sending money, goods, passwords, investments, or personal information may involve computer-related fraud.
Examples include:
- Fake online selling accounts;
- Fake investment accounts;
- Fake charity solicitation;
- Fake job recruitment requiring fees;
- Romance scams;
- Fake customer service accounts;
- Fake “account recovery” or “verification” accounts.
3. Cyber libel
If the fake account posts defamatory statements online, cyber libel may be involved. Cyber libel generally requires a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance that tends to dishonor or discredit a person.
Cyber libel is serious because online publication may increase exposure and harm.
4. Illegal access, data interference, or system misuse
If the fake account is connected to hacking, unauthorized access to an Instagram account, password theft, or account takeover, other cybercrime provisions may apply.
B. Revised Penal Code
Even without the Cybercrime Prevention Act, traditional crimes under the Revised Penal Code may apply.
1. Libel
If the defamatory content is published in writing or similar means, libel may be involved. When committed online, it may become cyber libel.
2. Grave threats
If the fake account threatens to kill, injure, expose, harm, or commit a crime against the victim, the conduct may amount to threats.
3. Unjust vexation
Repeated harassment, annoying messages, malicious tagging, or conduct intended to irritate or disturb another person may be treated as unjust vexation, depending on the facts.
4. Estafa or swindling
If the fake account deceives a person into giving money, property, or benefit, estafa may apply. If done through online means, cybercrime provisions may also be relevant.
C. Data Privacy Act of 2012 — Republic Act No. 10173
The Data Privacy Act protects personal information and sensitive personal information.
A fake Instagram account may raise data privacy concerns if it:
- Uses someone’s photos without authority;
- Publishes personal information such as address, phone number, school, workplace, government ID, or private messages;
- Doxxes a person;
- Processes personal information without consent or lawful basis;
- Uses someone’s identity to mislead others;
- Shares sensitive personal information.
The National Privacy Commission may become relevant where there is misuse, unauthorized disclosure, or unlawful processing of personal data.
D. Safe Spaces Act — Republic Act No. 11313
The Safe Spaces Act covers gender-based sexual harassment, including online sexual harassment.
A fake Instagram account may fall under this law if it is used for:
- Misogynistic, sexist, homophobic, or transphobic remarks;
- Unwanted sexual comments;
- Sexual threats;
- Uploading or sharing sexual photos or videos;
- Cyberstalking;
- Repeated sexual harassment;
- Creating fake accounts to shame or sexually humiliate a person.
This law is especially relevant where the fake account targets someone based on sex, gender identity, sexual orientation, or gender expression.
E. Anti-Photo and Video Voyeurism Act — Republic Act No. 9995
This law may apply if the fake account posts, threatens to post, shares, or distributes private sexual photos or videos without consent.
The key issue is not only whether the content is real, but whether it involves private sexual images or recordings and whether consent was given for recording, sharing, or publication.
F. Anti-Violence Against Women and Their Children Act — Republic Act No. 9262
If the fake account is used by a spouse, former spouse, boyfriend, former boyfriend, dating partner, or sexual partner to harass, threaten, control, shame, blackmail, or emotionally abuse a woman, the VAWC law may apply.
Examples include:
- Threatening to post intimate photos;
- Creating a fake account to humiliate a former partner;
- Monitoring or stalking through Instagram;
- Sending abusive messages;
- Using fake accounts to contact friends, family, or employers;
- Repeated public shaming.
G. Special Protection of Children Against Abuse, Exploitation and Discrimination Act — Republic Act No. 7610
If the victim is a minor, additional child protection laws may apply. A fake account targeting a child may involve child abuse, online sexual abuse or exploitation, cyberbullying, threats, grooming, or harassment.
Schools may also become involved if the matter affects students or occurs in an educational setting.
H. Anti-Bullying Act of 2013 — Republic Act No. 10627
For students, cyberbullying through fake Instagram accounts may fall under school anti-bullying policies. This includes repeated harmful online conduct, impersonation, humiliation, spreading rumors, posting edited photos, or targeting a student through social media.
The school may investigate and impose disciplinary measures under its student handbook and anti-bullying procedures.
I. Intellectual Property and Trademark Issues
If a fake account impersonates a business, brand, creator, or professional service, intellectual property issues may arise, especially when the account uses:
- Trademarks;
- Business names;
- Copyrighted images;
- Logos;
- Product photos;
- Brand identity;
- Misleading advertisements.
The owner may report the account to Instagram for trademark or copyright infringement and may also consider civil or administrative remedies.
IV. First Step: Preserve Evidence Before Reporting
Before blocking or reporting the fake account, preserve evidence. Many victims report the account first, but once Instagram removes it, the victim may lose access to important proof.
A. Take screenshots
Screenshot the following:
- Profile page;
- Username and display name;
- Bio;
- Profile picture;
- Follower and following count;
- Posts, reels, stories, highlights;
- Captions;
- Comments;
- Direct messages;
- Threats;
- Payment demands;
- Links in bio;
- Phone numbers, email addresses, GCash numbers, Maya numbers, bank accounts, or other contact details;
- Tagged posts;
- Accounts interacting with the fake account;
- Dates and times visible on the screen.
Screenshots should include the full screen where possible, showing the username, date, time, and relevant content.
B. Record the URL
Save the exact Instagram profile link. If the fake account changes its username, the old link may stop working. Also save individual post links when possible.
C. Screen-record the account
A screen recording can show that the content existed on the Instagram app or website. It can also capture stories, highlights, profile navigation, and message threads.
D. Save message requests
Do not immediately delete direct messages. Save them first. If the account sent threats, scams, or blackmail messages, the exact wording matters.
E. Download or back up your own Instagram data
If the fake account interacted with your real account, your own Instagram data may help preserve messages, comments, or interactions.
F. Preserve metadata where possible
Screenshots alone may be challenged. Stronger evidence may include:
- Original downloaded images;
- Email notifications from Instagram;
- Message timestamps;
- Transaction receipts;
- Payment confirmations;
- Bank or e-wallet records;
- Links;
- Header information from emails, if phishing is involved.
G. Prepare an evidence log
Create a simple chronology:
| Date/Time | Event | Evidence |
|---|---|---|
| May 1, 2026, 8:30 PM | Fake account messaged victim | Screenshot 1 |
| May 2, 2026, 10:05 AM | Account posted victim’s photo | Screenshot 2 |
| May 3, 2026, 1:00 PM | Account demanded money | Screenshot 3 |
| May 4, 2026, 7:45 PM | Victim paid through GCash | Receipt 1 |
A clear timeline helps investigators, lawyers, schools, employers, and platforms understand the case.
V. Reporting the Fake Account to Instagram
Instagram has in-app reporting tools for impersonation, harassment, scams, nudity, intellectual property violations, and privacy issues.
A. Report impersonation
For an account pretending to be you, your business, your child, or someone you represent, use Instagram’s impersonation reporting process.
You may be asked to identify whether the account is impersonating:
- You;
- Someone you know;
- A celebrity or public figure;
- A business or organization.
Instagram may require proof of identity, especially if the account impersonates a real person.
B. Report harassment or bullying
If the account sends abusive messages, comments, threats, or humiliating posts, report the specific content, not only the profile.
Report:
- Messages;
- Posts;
- Comments;
- Stories;
- Reels;
- Profile bio;
- Highlights.
Specific content reports are often more effective than general profile reports.
C. Report scams or fraud
If the account is selling fake items, asking for money, pretending to be a bank, or phishing for credentials, report it as a scam or fraud.
Also report associated payment accounts to:
- The e-wallet provider;
- The bank;
- The marketplace involved;
- The payment processor.
D. Report privacy violations
If the account posted your private information, photos, ID, contact number, address, or private messages, report the specific content for privacy violation.
E. Report intellectual property violations
Businesses, creators, and brand owners may use Instagram’s copyright or trademark reporting channels if the fake account uses protected materials.
F. Ask friends not to engage
Tell friends, family, and followers not to message, comment, threaten, or harass the fake account. Engagement can encourage the offender, alert them to delete evidence, or complicate the case.
VI. Reporting to Philippine Authorities
Reporting to Instagram may remove the account, but it may not identify or prosecute the person behind it. For tracing and legal action, a report to Philippine authorities may be necessary.
A. Philippine National Police Anti-Cybercrime Group
The PNP Anti-Cybercrime Group handles cybercrime complaints, including cyber libel, online threats, identity theft, online scams, hacking, and cyber harassment.
A complainant should prepare:
- Government-issued ID;
- Screenshots and recordings;
- URLs;
- Account usernames;
- Timeline of events;
- Affidavit or sworn statement, if required;
- Proof of damage, threats, or payments;
- Witness details, if any;
- Device used to receive messages;
- Payment receipts, if scam or extortion is involved.
B. National Bureau of Investigation Cybercrime Division
The NBI Cybercrime Division also receives complaints involving cybercrime. Victims may file a complaint and submit digital evidence.
The NBI may assist in investigation, evidence preservation, coordination with platforms, and case buildup.
C. Local police station or prosecutor’s office
For threats, harassment, estafa, VAWC, child protection issues, or urgent safety risks, a victim may also seek help from the local police, Women and Children Protection Desk, barangay, or prosecutor’s office.
D. National Privacy Commission
If the fake account involves unauthorized use, disclosure, or processing of personal information, a complaint may be filed with the National Privacy Commission.
This may be relevant where the fake account posts:
- Government IDs;
- Private addresses;
- Contact numbers;
- Medical information;
- School records;
- Employment information;
- Private messages;
- Sensitive personal data.
E. School, employer, or platform-level reporting
If the suspected offender is a student, employee, contractor, seller, influencer, or member of an organization, the victim may also report internally, especially where the fake account violates school rules, workplace policies, brand policies, or professional standards.
VII. Can a Fake Instagram Account Be Traced?
Yes, but tracing is not as simple as “finding the IP address” by yourself. In lawful investigations, tracing usually requires cooperation from platforms, internet service providers, payment providers, and law enforcement.
A. What can be traced?
Investigators may attempt to identify:
- Email address used to create the account;
- Phone number linked to the account;
- IP addresses used to log in;
- Device identifiers;
- Login dates and times;
- Recovery email or phone;
- Linked Facebook or Meta accounts;
- Payment accounts used in scams;
- Bank or e-wallet recipients;
- Other accounts controlled by the same person.
B. What ordinary users cannot lawfully do
A victim should not hack, phish, stalk, dox, or illegally obtain data from the fake account. Doing so may expose the victim to legal liability.
Avoid:
- Sending fake login links;
- Installing spyware;
- Accessing the suspect’s account;
- Guessing passwords;
- Threatening the suspect;
- Publishing the suspect’s alleged identity without proof;
- Paying “hackers” to trace the account;
- Buying leaked data;
- Doxxing the suspected person.
C. Why law enforcement is usually needed
Instagram generally will not disclose private account registration data to ordinary users. Law enforcement may request data through lawful processes. The exact process may depend on the nature of the case, applicable treaties, platform policies, data retention, urgency, and whether the account information is still available.
D. Limits of tracing
Tracing may be difficult if the offender used:
- VPNs;
- Public Wi-Fi;
- Fake emails;
- Unregistered or borrowed SIM cards;
- Compromised accounts;
- Stolen devices;
- Foreign infrastructure;
- Disposable accounts;
- Deleted accounts;
- Encrypted communications.
Even then, mistakes by offenders often leave trails, such as repeated usernames, payment details, recovery numbers, reused photos, writing patterns, mutual contacts, transaction records, or login patterns.
VIII. Emergency Situations
Some fake account cases require immediate action.
A. Threats of physical harm
If the account threatens violence, stalking, kidnapping, sexual assault, or harm to family members, treat it as urgent. Preserve evidence and contact law enforcement immediately.
B. Sextortion or blackmail
If the account threatens to release intimate images or videos:
- Do not send more images;
- Do not pay if avoidable, as payment may encourage further demands;
- Preserve all threats;
- Save the account URL and payment details;
- Report to Instagram;
- Report to cybercrime authorities;
- Consider legal assistance immediately.
C. Minors involved
If a child is targeted, groomed, threatened, exploited, or sexually harassed, involve a parent or guardian, school authorities when relevant, and law enforcement promptly.
D. Suicide, self-harm, or severe harassment
If the victim is in immediate distress or danger, prioritize safety, family support, emergency assistance, and local authorities.
IX. Evidence Requirements in Philippine Proceedings
Digital evidence must be collected and presented carefully.
A. Screenshots are useful but may not be enough
Screenshots can support a complaint, but they may be questioned because they can be edited. The more supporting evidence, the better.
Useful supporting evidence includes:
- Screen recordings;
- URLs;
- Original files;
- Email notifications;
- Witness statements;
- Device logs;
- Payment receipts;
- Platform responses;
- Certified or notarized printouts, where appropriate;
- Affidavit explaining how the evidence was captured.
B. Chain of custody
For serious cases, especially criminal cases, it matters who collected the evidence, when it was collected, how it was stored, and whether it was altered.
Maintain original files and avoid editing screenshots except to create copies for presentation. Keep backups.
C. Affidavit of complaint
Authorities may require the complainant to execute an affidavit stating:
- Identity of the complainant;
- Facts of the incident;
- How the fake account was discovered;
- Why the account is fake or harmful;
- What content was posted or sent;
- Damage suffered;
- Evidence attached;
- Suspected person, if known;
- Relief requested.
D. Witnesses
Witnesses may include:
- People who saw the fake account;
- People who received messages from it;
- People deceived by it;
- People who can identify the victim’s real account;
- People who can connect the fake account to a suspect.
X. Remedies Available to the Victim
Depending on the facts, a victim may pursue several remedies.
A. Platform takedown
Instagram may remove the account or specific content if it violates platform rules.
B. Criminal complaint
A criminal complaint may be filed for cybercrime, threats, cyber libel, fraud, identity theft, voyeurism, harassment, or other offenses.
C. Civil action
A victim may seek damages if the fake account caused reputational harm, emotional distress, business loss, privacy invasion, or financial injury.
D. Protection orders
In VAWC, child abuse, stalking, or harassment situations, protective remedies may be available depending on the relationship and facts.
E. Data privacy complaint
If personal data was misused, the victim may file a complaint with the National Privacy Commission.
F. School or workplace discipline
If the offender is connected to a school or employer, internal disciplinary action may be possible.
G. Demand letter
A lawyer may send a demand letter requiring the offender to:
- Stop using the fake account;
- Delete posts;
- Apologize or retract statements;
- Preserve evidence;
- Pay damages;
- Stop contacting the victim.
However, demand letters should be used carefully, especially if the offender is unknown, dangerous, or likely to delete evidence.
XI. How to Build a Strong Complaint
A strong complaint should answer the following questions:
Who is the victim? Provide full name, contact details, and proof of identity.
What is the fake account? Provide username, profile link, screenshots, and description.
Why is it fake or unlawful? Explain whether it impersonates, scams, threatens, defames, harasses, or exposes private data.
What exactly did it do? Attach posts, comments, messages, stories, and transactions.
When did it happen? Provide dates and times.
Where was the victim located? This may matter for jurisdiction and reporting.
What harm occurred? State reputational damage, emotional distress, financial loss, threats, fear, business harm, or privacy harm.
Who may be behind it? Provide only factual basis. Avoid unsupported accusations.
What action is requested? Investigation, takedown, tracing, prosecution, protection, or assistance.
XII. Practical Steps for Victims
Step 1: Do not panic or engage emotionally
Do not threaten the fake account. Do not post accusations immediately. Do not alert the suspect before preserving evidence.
Step 2: Preserve evidence
Take screenshots, screen recordings, URLs, and transaction records.
Step 3: Secure your own accounts
Change passwords and enable two-factor authentication on:
- Instagram;
- Facebook;
- Email;
- Banking apps;
- E-wallets;
- Other social media accounts.
Use a strong password that is not reused elsewhere.
Step 4: Warn close contacts
Tell friends, family, clients, or followers that the account is fake. Ask them not to send money or personal information.
Step 5: Report the account to Instagram
Use the correct report category: impersonation, scam, harassment, nudity, privacy, or intellectual property.
Step 6: Report financial channels
If money is involved, report the recipient account to the bank, GCash, Maya, remittance center, or payment platform.
Step 7: File a complaint with cybercrime authorities
Bring organized evidence and IDs.
Step 8: Consult a lawyer for serious cases
Legal assistance is especially important for cyber libel, sextortion, VAWC, child cases, financial scams, or public accusations.
XIII. What Businesses and Public Figures Should Do
Fake Instagram accounts often target businesses, influencers, professionals, politicians, schools, churches, and organizations.
A. Immediate business response
A business should:
- Announce the official account;
- Warn customers not to transact with the fake account;
- Report the fake account to Instagram;
- Preserve evidence;
- Report fraudulent payment channels;
- Notify customers who may have been scammed;
- Monitor similar accounts.
B. Trademark and brand protection
If the fake account uses logos, brand names, product images, or copyrighted content, intellectual property takedown tools may be used.
C. Customer protection
Businesses should publish official payment channels and warn customers that payments to unverified accounts are not authorized.
D. Internal investigation
If the fake account appears to know internal details, investigate whether an employee, former employee, contractor, or compromised account is involved.
XIV. Common Mistakes to Avoid
A. Reporting before collecting evidence
The account may disappear, taking evidence with it.
B. Publicly accusing someone without proof
Wrongful accusations may expose the victim to libel or cyber libel claims.
C. Paying blackmailers
Payment may not stop the offender and may lead to more demands.
D. Hiring hackers
This can be illegal and may result in scams or further exposure.
E. Editing screenshots
Edited evidence may be challenged. Keep originals.
F. Using only one screenshot
A single screenshot may not show context. Capture the profile, posts, messages, dates, and links.
G. Ignoring financial trails
In scam cases, payment details may be more useful than the Instagram username.
H. Delaying action
Digital evidence can disappear. Accounts may be deleted. Platform logs may not be retained forever.
XV. When the Suspect Is Known
Sometimes the victim suspects a classmate, former partner, employee, competitor, relative, or customer.
In that case:
- Preserve evidence first;
- Avoid direct confrontation if there is risk of deletion or retaliation;
- Record factual reasons for suspicion;
- Identify witnesses;
- Check if the suspect had access to the photos or information used;
- Report to authorities or seek legal assistance.
A suspicion is not proof. The complaint should separate confirmed facts from assumptions.
XVI. When the Account Is Abroad
Instagram accounts may be operated from outside the Philippines. A Philippine victim may still report the incident locally if the harm occurred in the Philippines or the victim is located in the Philippines.
Cross-border tracing may require additional legal processes. Practical remedies may include:
- Platform takedown;
- Reporting payment channels;
- Reporting to Philippine cybercrime authorities;
- Reporting to foreign platforms;
- Preserving evidence for future proceedings.
XVII. Jurisdiction and Venue
Cybercrime cases can raise questions of jurisdiction because the offender, platform, server, and victim may be in different places.
In general, Philippine authorities may act when:
- The victim is in the Philippines;
- The harmful content is accessed in the Philippines;
- The offender is in the Philippines;
- The damage occurs in the Philippines;
- The transaction or communication affects a Philippine person or entity.
For filing, victims often approach cybercrime units, local prosecutors, or law enforcement offices with jurisdiction over their residence, place of injury, or relevant incident.
XVIII. Special Topics
A. Fake accounts using your photos but not your name
This may still be actionable if the account misleads others, violates privacy, uses personal data without authority, or causes harm.
B. Fake account using your child’s photos
This should be treated seriously. Preserve evidence and report promptly. If the content is exploitative, sexualized, threatening, or abusive, law enforcement involvement is important.
C. Fake account posting memes or edited photos
Edited photos may be unlawful if defamatory, harassing, obscene, sexually abusive, privacy-invasive, or intended to humiliate.
D. Fake account pretending to sell products
This may involve estafa, cyber fraud, consumer protection issues, and payment platform violations.
E. Fake account pretending to be a government office
This may involve fraud, identity misuse, public deception, and possible additional offenses depending on the content.
F. Fake account pretending to be a lawyer, doctor, school, or company
This may involve fraud, professional misconduct issues, unfair competition, trademark misuse, or public deception.
XIX. Sample Evidence Checklist
Before filing a report, prepare:
- Valid government ID;
- Screenshot of fake profile;
- Instagram username and profile link;
- Screenshots of posts, stories, comments, reels, highlights;
- Screenshots of direct messages;
- Screen recording showing the account;
- Date and time of discovery;
- Timeline of incidents;
- List of witnesses;
- Proof that the photos or identity belong to the victim;
- Proof of financial loss, if any;
- Bank, GCash, Maya, or remittance details, if any;
- Threat messages, if any;
- Links to posts or accounts;
- Your contact details;
- Draft affidavit or written narrative.
XX. Sample Incident Narrative
A simple written narrative may look like this:
I discovered on [date] that an Instagram account using the username [username] was using my name and photos without my consent. The account posted [describe posts] and sent messages to [describe recipients]. I am not connected with this account and did not authorize its creation. The account caused [describe harm]. I preserved screenshots, screen recordings, and links, which are attached to this complaint. I request assistance in investigating, preserving records, identifying the person responsible, and taking appropriate legal action.
For scam cases:
On [date], I communicated with the Instagram account [username], which offered [product/service/investment]. I was instructed to pay [amount] through [payment method] to [account name/number]. After payment, the account stopped responding or blocked me. I later discovered that the account was fake. I am attaching screenshots of the account, our messages, payment receipts, and transaction details.
For threats:
On [date], the Instagram account [username] sent messages threatening to [describe threat]. I felt fear for my safety and preserved the messages. I request immediate assistance and investigation.
XXI. Privacy and Safety Precautions
Victims should also protect themselves while the case is ongoing.
- Set social media accounts to private temporarily;
- Remove public contact details;
- Review tagged photos;
- Turn off message requests from strangers;
- Enable two-factor authentication;
- Warn close contacts;
- Monitor for duplicate fake accounts;
- Avoid posting personal routines or location;
- Keep copies of all new incidents;
- Do not retaliate.
XXII. The Role of Lawyers
A lawyer can assist by:
- Evaluating the correct legal cause of action;
- Preparing affidavits;
- Filing complaints;
- Drafting demand letters;
- Coordinating with law enforcement;
- Assessing cyber libel risks;
- Preserving evidence properly;
- Advising on civil damages;
- Assisting in protection order applications;
- Communicating with platforms or institutions.
Legal help is especially useful where the matter involves public accusations, intimate images, minors, substantial money, business damage, or a known suspect.
XXIII. Conclusion
A fake Instagram account in the Philippines may be more than a nuisance. Depending on its conduct, it may involve cybercrime, identity theft, fraud, cyber libel, harassment, privacy violations, sexual harassment, blackmail, or child protection issues.
The most important first step is evidence preservation. Victims should capture screenshots, URLs, messages, account details, transaction records, and timelines before reporting the account. Instagram reporting may help remove the content, but lawful tracing usually requires law enforcement or appropriate legal process. Victims should avoid hacking, doxxing, or retaliating, as these may create separate legal problems.
A careful, evidence-based approach gives the victim the best chance of account removal, offender identification, legal accountability, and personal protection.