Cloud
Cloud
Cloud
Cloud

Abuse Reporting

Report Abuse

Help us maintain a safe and secure environment by reporting abuse, illegal content, or policy violations

Report Abuse or Policy Violations

We take abuse reports seriously and are committed to maintaining a safe and secure environment for all users. Our dedicated abuse response team reviews every report and takes appropriate action to address violations of our policies, terms of service, or applicable laws. By submitting your report through this official channel, you ensure that your complaint is tracked, investigated, and acted upon promptly. Unlike unsolicited emails that may go unnoticed or be delayed, reports submitted here receive priority attention and you will typically receive a reference ID within 24 hours, allowing you to track the progress of your case. We understand the sensitive nature of abuse reporting and handle all submissions with the utmost discretion and professionalism.

Which category of abuse to select?

Select the category that best matches the abuse you're reporting. Review the categories below to help you choose the most appropriate one. Accurate categorization helps us process your report more efficiently and route it to the right specialists.

  • Malware Distribution

    Report websites or domains distributing malicious software or engaging in harmful activities

  • Phishing / Scam

    Report phishing attempts, fraudulent websites, or scams targeting users

  • Copyright Violation (DMCA)

    Report unauthorized use of copyrighted material or intellectual property violations

  • Trademark Violation

    Report unauthorized use of trademarks or brand infringement

  • CSAM / Exploitation

    Report child sexual abuse material or exploitation content (immediate action will be taken)

  • Terrorism / Violence

    Report content promoting terrorism, violence, or extremist activities

  • Personal Data Exposure / Doxxing

    Report unauthorized sharing of personal information or doxxing attempts

  • Illegal Goods or Services

    Report websites selling illegal goods or providing prohibited services

  • Network Misuse / API Abuse

    Report abuse of our network, APIs, or services

  • Other

    Report other types of abuse or policy violations not covered above

What evidence to include in your report?

To ensure your abuse report is processed effectively, it's important to include relevant evidence. Below are guidelines on what evidence to attach and how to properly document your report.

Acceptable Evidence Formats

You can attach multiple files as evidence. Supported formats include:

  • Screenshots or photos of the abusive content
  • PDF documents containing proof or documentation
  • Text files with relevant information
  • Links or URLs where the abuse is occurring
  • Any other relevant documentation (max 10MB per file)

How to attach evidence

In the report form, you can upload multiple files using the drag-and-drop area or by clicking to browse your files. You can upload up to 10 files in total, with each file having a maximum size of 10MB.

  • Make screenshots clear and readable with relevant context
  • Include timestamps if available
  • Document the complete URL or domain involved
  • Provide any additional context that may help the investigation

Note: All evidence you submit is kept confidential and is used solely for investigating the reported abuse. We work in coordination with ICANN and other relevant authorities when necessary to address domain-related issues promptly.

What information to include in your report?

To ensure your report can be processed effectively, please include as much detail as possible about the abuse.

  • Specific URLs or domains where the abuse is occurring
  • Clear description of the abusive content or activity
  • Date and time when you observed the abuse (SGT timezone)
  • Any evidence or supporting documentation (screenshots, files, etc.)
  • Your contact information for follow-up if needed
  • Any other relevant details that may help in the investigation

How to keep your report anonymous from third parties?

We understand the importance of privacy and anonymity when reporting abuse. Here's how we protect your information.

Your Privacy is Protected

We maintain strict confidentiality regarding your identity. Your personal information is used solely for investigating the reported abuse and will not be shared with third parties without your explicit consent, except as required by law.

What happens after you submit your report?

Once you submit your abuse report, we will review it within 1-3 business days. You will receive a reference ID that you can use to track the status of your report. We will investigate the matter and take appropriate action based on our policies and applicable laws.

Start Your Free Plan

Let’s Supercharge Your Website Today!