What to Include in Your Report
Information | Status | Description |
---|---|---|
Date, time, and timezone of the incident | REQUIRED | Specify when the abusive activity occurred |
Source IP address(es) involved in the abusive activity | REQUIRED | The IP addresses that originated the abuse |
Type of abuse (see categories below) | REQUIRED | Category of abuse from our list below |
Your contact information for follow-up | REQUIRED | Email or phone for case updates |
Full email headers (for spam/phishing) | OPTIONAL | Complete headers for email-based abuse |
Server or firewall logs showing the abusive activity | OPTIONAL | Log files demonstrating the abuse |
Relevant URLs or domains involved | OPTIONAL | Any websites or domains related to the incident |
Screenshots, packet captures, or other technical evidence | OPTIONAL | Visual or technical proof of the abuse |
Abuse Categories We Handle
We investigate and respond to all types of network abuse including:- Spam
- Phishing/Fraud
- Hacking
- Brute Force/Login Attacks
- DDoS Attacks
- Malware
- Port Scanning
- Web Scraping of non-publicly available information
- Copyright Infringement/DMCA Violations
- Hosting Violence/CSAM/Illegal Content