We take abuse reports very seriously and will investigate suspected misuse of domains registered through Unstoppable Domains.
If you believe a domain is being used for harmful, illegal, or policy-violating activity, please contact our abuse team.
Report abuse: abuse@unstoppabledomains.com
This includes reports about phishing, malware, fraud, spam, child exploitation, trademark/copyright issues, and other types of abuse listed below.
What to Include in Your Abuse Report
Including detailed, accurate information helps us review and act on your report much faster.
At a minimum, please provide:
Your contact details
Your full name
Your email address
Domain details
The domain name(s) involved
Any specific URL(s) where the abuse occurs
Description of the issue
A short, clear explanation of what you observed
When you noticed it (date/time and time zone, if relevant)
Evidence
Screenshots of the abusive content
For email abuse: full email headers + message body
Logs (for hacking/technical attacks)
Any other supporting documentation (invoices, legal notices, etc.)
Abuse Types and Required Information
Below are the main categories of abuse we handle, along with what each means and what information to send us.
Where to send reports for all types below:
abuse@unstoppabledomains.com
Please clearly state the abuse type in the email subject line (e.g. “Abuse Report – Phishing”, “Abuse Report – Malware”, “Abuse Report – Child Exploitation”).
1. Child Abuse / Child Sexual Abuse Material (CSAM)
What this is
Content that sexualizes, exploits, or depicts minors (anyone under 18 years of age), including real or generated imagery. This includes “adult” content if the person depicted is or appears to be a minor.
What to include in your report
Abusive Domain Name(s)
Abusive URL(s)
Screenshots (only if safe and legal to capture; do not share or redistribute content more than necessary)
Any other details that help us locate the content quickly (e.g. how you found it)
Important:
If you believe a child is in immediate danger, please contact your local law enforcement agency first, then submit the report to us.
2. Email Abuse / Spam
What this is
Unsolicited commercial bulk email (“spam”), including spamvertising, where a domain is advertised in spam sent from another network.
Legitimate marketing emails should comply with applicable laws (e.g. CAN-SPAM or similar local regulations) – including valid opt-out mechanisms and accurate sender information.
What to include
“From” address
“To” address
Full email headers
Email content (body of the message)
Any relevant timestamps or context (e.g. “I never subscribed to this list”)
Full headers are essential to allow us to trace the actual sending source.
3. Fraud / Scam
What this is
Wrongful deception with the intent to gain money, financial data, login credentials, or other valuable information (for example, fake investment opportunities, fake stores, impersonation scams, etc.).
What to include
Abusive Domain Name(s)
Abusive URL(s)
Paid invoices or receipts (if you made a payment)
Screenshots of the abusive page or transaction flow
Emails related to the fraud with full headers and body (if applicable)
Additional guidance
If you believe you are a victim of an internet crime, we strongly recommend filing a complaint with your national cybercrime or fraud reporting centre and/or contacting your local authorities or legal counsel.
4. Phishing
What this is
A form of fraud designed to trick users into revealing sensitive information (usernames, passwords, PINs, credit card or bank details, etc.) using fake websites or messages that closely imitate legitimate services.
What to include
Abusive Domain Name(s)
Abusive URL(s) (e.g. the phishing login page)
The legitimate service/website being impersonated (target of the attack)
Country your IP address belongs to (the content may be geo-blocked)
Device and browser details (e.g. “Mobile / Android / Chrome” vs “PC / Windows / Firefox”)
Any phishing emails received, with full headers and content
Safety tip
If you clicked a suspicious link or opened a suspicious attachment, run a full antivirus/antimalware scan on your device and change any potentially compromised passwords immediately.
5. Illegal Pharmacy
What this is
Websites selling or distributing medications without valid prescriptions, or offering outdated, substituted, or counterfeit medications in violation of applicable law.
What to include
Abusive Domain Name(s)
Abusive URL(s) (specific product/order pages)
Screenshots of the page showing the sale or promotion of medication
6. Malware
What this is
Software delivered via a domain/website that is designed to disrupt systems, gather sensitive information, or gain unauthorized access to devices or networks.
What to include
Abusive Domain Name(s)
Abusive URL(s) (download links, redirect URLs, etc.)
Any security vendor detections (e.g. antivirus report, sandbox report, VirusTotal link)
Logs or technical details if available (file hashes, payload names, etc.)
7. Hacking Activity / Network Attacks
What this is
Activities such as port scanning, brute-force login attempts, DDoS attacks, intrusion attempts, or other efforts to compromise or misuse systems, linked to a domain registered with us.
What to include
Abusive Domain Name(s)
Abusive URL(s)
Abusive IP address(es) (if relevant)
Date and time (including time zone) of when the abuse occurred
Full, unmasked logs from your firewall or security systems, including:
Source and destination IPs/domains
User-agent strings
Timestamps + time zone
Relevant error/attack signatures
8. Copyright / DMCA
What this is
Use of copyrighted content online without authorization from the rights holder (for example, copying text, images, videos, music, or other protected works without permission).
What to include
A clear description of the copyrighted work you claim is being infringed
The exact location (URL(s)) of the infringing material
Your contact details as the rights holder or authorized agent
A signed statement that:
You are the copyright owner or are authorized to act on their behalf
The use is not authorized by you, your agent, or the law
The information in your notice is accurate
To help us process copyright and DMCA-style takedown requests, please ensure your notice meets the requirements of applicable law and our Copyright and Trademark Policy.
For now, send copyright/trademark complaints to:
abuse@unstoppabledomains.com(subject line: “DMCA” or “Copyright”)
9. Trademark Infringement
What this is
Unauthorized use of a trademark or service mark in a way that is likely to cause confusion about the source, sponsorship, or affiliation of goods or services.
What to include
A formal notice of a trademark complaint that meets the requirements of our Copyright and Trademark Policy
Evidence of your trademark rights (e.g. registration number, jurisdiction)
The domain/URL(s) where the alleged infringement occurs
A description of how the use is infringing or causing confusion
In some cases, domain disputes may need to be resolved through applicable dispute-resolution procedures (such as UDRP/URS-style processes) or in court, depending on your jurisdiction and the TLD.
For trademark complaints, email:
abuse@unstoppabledomains.com(subject line: “Trademark”)
10. WHOIS / Registration Data Inaccuracy
(If applicable to your specific TLDs and data model)
What this is
Inaccurate, outdated, or false contact details provided in the domain’s registration data (e.g. invalid email, fake address).
What to include
Domain Name(s) concerned
The incorrect contact details you have identified
Any returned/bounced emails (with headers) if you attempted to contact the registrant
11. Other Abuse (General Abuse Reports)
What this is
Any other type of inappropriate or harmful content or activity not covered above, including but not limited to:
Identity theft / impersonation
Unauthorized redirects, framing, or IP pointing
Defamation
Terrorism/extremism propaganda
HYIP / Ponzi-style schemes
Warez / illegal distribution of copyrighted software
Any other content that appears to violate law or our policies
What to include
Abusive Domain Name(s)
Abusive URL(s)
Screenshot(s) of the abusive content
Short explanation of why you believe it is abusive
12. Disclosure Requests (Registration Data Requests)
What this is
Requests to obtain non-public registration data for a domain (sometimes formerly called “WHOIS data”), usually from law enforcement, regulators, or parties with a legitimate interest.
Please refer to this guide for disclosure requests.
13. Non-Consensual Intimate Visual Depictions
What this is
Intimate visual depictions of an identifiable individual (including deepfakes or AI-generated content) shared without their consent (sometimes referred to as “revenge porn” or non-consensual intimate imagery).
What to include
URLs where the imagery appears
Any evidence that the individual did not consent to publication
A statement that you are the person depicted or are authorized to act on their behalf
Important:
If you or someone you know is being targeted, consider also contacting local law enforcement or an appropriate support organization.
? For these sensitive cases, you can still report via:
?abuse@unstoppabledomains.com(subject line: “NCII”)
What We Do After You Report Abuse
When we receive your report at abuse@unstoppabledomains.com, we will:
Acknowledge and review
Confirm the domain is under our management.
Review the details and evidence you provided.
Investigate
Where we have jurisdiction and authority, we investigate whether the reported activity violates our policies or applicable law.
For technical or complex cases (malware, hacking, etc.), we may involve security specialists.
Take appropriate action
Depending on the findings, actions may include:Contacting the domain owner/registrant for remediation
Imposing restrictions on or suspending the domain
Working with relevant hosting providers or infrastructure partners
Escalating serious cases (e.g. child exploitation, credible threats, serious crime) to law enforcement or other competent authorities
Follow-up
Where appropriate and feasible, we may update you or request further information.
Not every report will result in visible action, but all valid reports are reviewed.