Skip to main content
If you believe abusive activity is originating from our services, please report it immediately to our dedicated abuse desk at abuse@pingproxies.com Our abuse desk operates 24/7 with continuous email monitoring. We aim to respond to all abuse reports within 24 hours and investigate/remediate cases within 48 hours. We prioritize cases involving active attacks, CSAM, and law enforcement requests.

What to Include in Your Report

InformationStatusDescription
Date, time, and timezone of the incidentREQUIREDSpecify when the abusive activity occurred
Source IP address(es) involved in the abusive activityREQUIREDThe IP addresses that originated the abuse
Type of abuse (see categories below)REQUIREDCategory of abuse from our list below
Your contact information for follow-upREQUIREDEmail or phone for case updates
Full email headers (for spam/phishing)OPTIONALComplete headers for email-based abuse
Server or firewall logs showing the abusive activityOPTIONALLog files demonstrating the abuse
Relevant URLs or domains involvedOPTIONALAny websites or domains related to the incident
Screenshots, packet captures, or other technical evidenceOPTIONALVisual or technical proof of the abuse
The more detailed information you provide, the faster we can investigate and take action.

Abuse Categories We Handle

We investigate and respond to all types of network abuse including:
  • Spam
  • Phishing/Fraud
  • Hacking
  • Brute Force/Login Attacks
  • DDoS Attacks
  • Malware
  • Port Scanning
  • Web Scraping of non-publicly available information
  • Copyright Infringement/DMCA Violations
  • Hosting Violence/CSAM/Illegal Content
Other abuse report types may be accepted at our discretion.

Our Investigation Process

When we receive an abuse report, we log it with a ticket number and acknowledge it within 24 hours. We then identify which service or infrastructure is involved and investigate to verify the activity. If confirmed, we take corrective action directly or require our downstream customers to address it with their end-users. We keep the reporting party updated throughout and confirm when the issue is resolved. Enforcement depends on severity. Minor issues get warnings. Serious abuse leads to suspension, null-routing, or service termination. Repeat offenders face permanent bans and IP revocation. For illegal content like CSAM, terrorism material, or violent extremism, we restrict services, permanently ban the customer and their fingerprint to prevent re-registration, and reserve the right to contact local law enforcement.

Law Enforcement & Regulatory Cooperation

We cooperate fully with properly authorized law enforcement requests from United Kingdom authorities and from jurisdictions friendly to the United Kingdom, including the United States, European Union member states, Canada, Australia, and other Five Eyes countries. All requests must meet appropriate legal standards with proper authorization such as court orders, warrants, or requests issued under the UK Investigatory Powers Act 2016.
I