We explain why there is no Grok token presale and expose the Grokcenter scam network built on recycled domains, bot-driven campaigns, and fake press releases.

A growing network of fraudulent crypto websites is abusing the name Grok, the AI product developed by xAI, to lure victims into a fake token presale. This investigation exposes how dozens of rotating domains impersonate Grok, redirecting users to a single scam hub: Grokcenter.net.
TLDR: There is no official Grok token, no legitimate presale, and no affiliation with Elon Musk, xAI, or X (formerly Twitter). Victims who send cryptocurrency to these sites do not receive any tokens and permanently lose their funds.
ℹ️ Related: Read our dedicated review of Grokcenter.net
Grokcenter.net presents itself as an “official” GROK token presale with a countdown timer, an urgency banner, and a big call-to-action like BUY GROK NOW. It claims investors can receive up to 200% bonus tokens, and accepts common cryptocurrencies (BTC, ETH, BNB, XRP, USDT, ADA, DOGE, SOL, USDC).
In reality, this “presale” is a classic crypto deposit trap: once funds are sent, victims don’t receive tokens, don’t get refunds, and are pushed into additional upsells (fees, KYC, “unlocking,” “bonus activation,” etc.) or simply ignored.
The impersonation is not subtle. Grokcenter repeatedly frames the project as being “spearheaded by Elon Musk,” and attempts to borrow credibility from xAI branding and hype.
Two major tells confirm the impersonation strategy:
This network relies on large batches of short-lived domains like grok12k.com, grok18k.com, etc. Many go down quickly, and new ones appear constantly. The goal is to keep launching fresh entry points faster than platforms can block them.

These domains are disposable traffic funnels. Once a domain gets flagged (browser warnings, wallet warnings, hosting takedown, reputation lists), the scammers rotate to a new one and keep the campaign running.
Most of these “pointer domains” show a nearly identical “Official Presale” landing page with a JOIN PRESALE button that forwards the victim to the central hub (grokcenter.net) where the actual wallet-drain / deposit instructions happen.
Grokcenter uses aggressive urgency mechanics:
All of these are standard conversion tricks used in crypto presale scams to maximize deposits before victims realize there is no real token sale.
Below is a table of domains observed as part of this rotating “GROKxxx” presale funnel network. These domains typically display the same fake presale landing page and push users toward grokcenter.net.
| grok12k.com | grok15g.com | grok15k.com |
| gro15k.com | grok17h.com | grok18k.com |
| grok19j.com | grok20k.com | grok25b.com |
| grok28w.com | grok29e.com | grok295l.com |
| grok31k.com | grok32u.com | grok39c.com |
| grok40u.com | grok47k.com | grok49e.com |
| grok50j.com | grok52g.com | grok53q.com |
| grok56p.com | grok58a.com | grok58z.com |
| grok60k.com | grok62l.com | grok62u.com |
| grok64g.com | grok66k.com | grok74k.com |
| grok76a.com | grok77k.com | grok80k.com |
| grok81d.com | grok84k.com | grok86k.com |
| grok90d.com | grok94k.com | grok111p.com |
| grok121k.com | grok132n.com | grok139g.com |
| grok145g.com | grok145n.com | grok145r.com |
| grok146n.com | grok148g.com | grok152m.com |
| grok165k.com | grok214k.com | grok221g.com |
| grok222h.com | grok222k.com | grok312h.com |
| grok334h.com | grok501n.com | grok512l.com |
| grok533h.com | grok546k.com | grok555k.com |
| grok583r.com | grok592p.com | grok614f.com |
| grok621b.com | grok639n.com | grok681h.com |
| grok699c.com | grok712r.com | grok732b.com |
| grok814b.com | grok825n.com | grok836d.com |
| grok836k.com | grok881p.com | grok999k.com |
Grokcenter.net is where the scam becomes “transactional.” It presents fake “presale details,” fake tokenomics (total supply, allocations, vesting), and fake utility claims (staking, governance, AI services) all designed to convince victims that sending crypto will result in a token allocation.
It also uses deliberately impressive-sounding buzzwords such as:
This is essentially “tech-word soup” built to sound credible while providing no verifiable company details, no audited smart contracts, and no legitimate exchange listings.
Scammers typically amplify these presales using bot-driven campaigns on X (Twitter) and other platforms. The posts often include:
These campaigns are designed to create the illusion that a presale is trending organically, when it’s actually a manufactured scam funnel.
This network also pushes misleading “sponsored” content designed to look like legitimate news coverage. One example is a promotional piece that frames “GROK18K” as a serious AI infrastructure project and uses long-form corporate language to disguise the fact it’s a presale funnel.

The most common outcome is simple: funds are received, and nothing is delivered. Since crypto transactions are irreversible, victims rarely recover deposits.
Because these sites are not legitimate token issuers. The “token” is a marketing prop. Even if a token exists, it’s often worthless, non-transferable, or never delivered as the real goal is extracting deposits.
If you encountered one of these “Grok Token Presale” pages, treat it as unsafe and avoid interacting with any wallet prompts, deposits, or “bonus” offers.
No. The site uses impersonation tricks (branding references, redirects to xAI policy pages, trademark claims) to appear official.
No. It behaves like a presale funnel designed to collect crypto deposits with no verifiable issuer or delivery mechanism.
Because scammers rotate domains in bulk to evade takedowns or warnings from reputable sources.
No. There is no legitimate Grok token presale. Claims promoting a Grok token sale are part of an impersonation scam designed to defraud victims.
Stop sending funds immediately, block all contact with the scammers and report the incident to your local authorities or financial crime unit.
Complete the form below to get a free consultation with cyber intelligence experts. Take action now and get help.