| Date, time, and timezone of the incident | REQUIRED | Specify when the abusive activity occurred |
| Source IP address(es) involved in the abusive activity | REQUIRED | The IP addresses that originated the abuse |
| Type of abuse (see categories below) | REQUIRED | Category of abuse from our list below |
| Your contact information for follow-up | REQUIRED | Email or phone for case updates |
| Full email headers (for spam/phishing) | OPTIONAL | Complete headers for email-based abuse |
| Server or firewall logs showing the abusive activity | OPTIONAL | Log files demonstrating the abuse |
| Relevant URLs or domains involved | OPTIONAL | Any websites or domains related to the incident |
| Screenshots, packet captures, or other technical evidence | OPTIONAL | Visual or technical proof of the abuse |