How to Report Domain Abuse

Modified on: Thu, 11 Dec, 2025 at 5:52 PM

We take abuse reports very seriously and will investigate suspected misuse of domains registered through Unstoppable Domains.

If you believe a domain is being used for harmful, illegal, or policy-violating activity, please contact our abuse team.

Report abuse: abuse@unstoppabledomains.com

This includes reports about phishing, malware, fraud, spam, child exploitation, trademark/copyright issues, and other types of abuse listed below.


What to Include in Your Abuse Report

Including detailed, accurate information helps us review and act on your report much faster.

At a minimum, please provide:

  • Your contact details

    • Your full name

    • Your email address 

  • Domain details

    • The domain name(s) involved

    • Any specific URL(s) where the abuse occurs

  • Description of the issue

    • A short, clear explanation of what you observed

    • When you noticed it (date/time and time zone, if relevant)

  • Evidence

    • Screenshots of the abusive content

    • For email abuse: full email headers + message body

    • Logs (for hacking/technical attacks)

    • Any other supporting documentation (invoices, legal notices, etc.)


Abuse Types and Required Information

Below are the main categories of abuse we handle, along with what each means and what information to send us.

Where to send reports for all types below:
abuse@unstoppabledomains.com
Please clearly state the abuse type in the email subject line (e.g. “Abuse Report – Phishing”, “Abuse Report – Malware”, “Abuse Report – Child Exploitation”).


1. Child Abuse / Child Sexual Abuse Material (CSAM)

What this is
Content that sexualizes, exploits, or depicts minors (anyone under 18 years of age), including real or generated imagery. This includes “adult” content if the person depicted is or appears to be a minor.

What to include in your report

  • Abusive Domain Name(s)

  • Abusive URL(s)

  • Screenshots (only if safe and legal to capture; do not share or redistribute content more than necessary)

  • Any other details that help us locate the content quickly (e.g. how you found it)

Important:
If you believe a child is in immediate danger, please contact your local law enforcement agency first, then submit the report to us.


2. Email Abuse / Spam

What this is
Unsolicited commercial bulk email (“spam”), including spamvertising, where a domain is advertised in spam sent from another network.

Legitimate marketing emails should comply with applicable laws (e.g. CAN-SPAM or similar local regulations) – including valid opt-out mechanisms and accurate sender information.

What to include

  • “From” address

  • “To” address

  • Full email headers

  • Email content (body of the message)

  • Any relevant timestamps or context (e.g. “I never subscribed to this list”)

Full headers are essential to allow us to trace the actual sending source.


3. Fraud / Scam

What this is
Wrongful deception with the intent to gain money, financial data, login credentials, or other valuable information (for example, fake investment opportunities, fake stores, impersonation scams, etc.).

What to include

  • Abusive Domain Name(s)

  • Abusive URL(s)

  • Paid invoices or receipts (if you made a payment)

  • Screenshots of the abusive page or transaction flow

  • Emails related to the fraud with full headers and body (if applicable)

Additional guidance
If you believe you are a victim of an internet crime, we strongly recommend filing a complaint with your national cybercrime or fraud reporting centre and/or contacting your local authorities or legal counsel.


4. Phishing

What this is
A form of fraud designed to trick users into revealing sensitive information (usernames, passwords, PINs, credit card or bank details, etc.) using fake websites or messages that closely imitate legitimate services.

What to include

  • Abusive Domain Name(s)

  • Abusive URL(s) (e.g. the phishing login page)

  • The legitimate service/website being impersonated (target of the attack)

  • Country your IP address belongs to (the content may be geo-blocked)

  • Device and browser details (e.g. “Mobile / Android / Chrome” vs “PC / Windows / Firefox”)

  • Any phishing emails received, with full headers and content

Safety tip
If you clicked a suspicious link or opened a suspicious attachment, run a full antivirus/antimalware scan on your device and change any potentially compromised passwords immediately.


5. Illegal Pharmacy

What this is
Websites selling or distributing medications without valid prescriptions, or offering outdated, substituted, or counterfeit medications in violation of applicable law.

What to include

  • Abusive Domain Name(s)

  • Abusive URL(s) (specific product/order pages)

  • Screenshots of the page showing the sale or promotion of medication


6. Malware

What this is
Software delivered via a domain/website that is designed to disrupt systems, gather sensitive information, or gain unauthorized access to devices or networks.

What to include

  • Abusive Domain Name(s)

  • Abusive URL(s) (download links, redirect URLs, etc.)

  • Any security vendor detections (e.g. antivirus report, sandbox report, VirusTotal link)

  • Logs or technical details if available (file hashes, payload names, etc.)


7. Hacking Activity / Network Attacks

What this is
Activities such as port scanning, brute-force login attempts, DDoS attacks, intrusion attempts, or other efforts to compromise or misuse systems, linked to a domain registered with us.

What to include

  • Abusive Domain Name(s)

  • Abusive URL(s)

  • Abusive IP address(es) (if relevant)

  • Date and time (including time zone) of when the abuse occurred

  • Full, unmasked logs from your firewall or security systems, including:

    • Source and destination IPs/domains

    • User-agent strings

    • Timestamps + time zone

    • Relevant error/attack signatures


8. Copyright / DMCA

What this is
Use of copyrighted content online without authorization from the rights holder (for example, copying text, images, videos, music, or other protected works without permission).

What to include

  • A clear description of the copyrighted work you claim is being infringed

  • The exact location (URL(s)) of the infringing material

  • Your contact details as the rights holder or authorized agent

  • A signed statement that:

    • You are the copyright owner or are authorized to act on their behalf

    • The use is not authorized by you, your agent, or the law

    • The information in your notice is accurate

To help us process copyright and DMCA-style takedown requests, please ensure your notice meets the requirements of applicable law and our Copyright and Trademark Policy.

For now, send copyright/trademark complaints to:
abuse@unstoppabledomains.com (subject line: “DMCA” or “Copyright”)


9. Trademark Infringement

What this is
Unauthorized use of a trademark or service mark in a way that is likely to cause confusion about the source, sponsorship, or affiliation of goods or services.

What to include

  • A formal notice of a trademark complaint that meets the requirements of our Copyright and Trademark Policy

  • Evidence of your trademark rights (e.g. registration number, jurisdiction)

  • The domain/URL(s) where the alleged infringement occurs

  • A description of how the use is infringing or causing confusion

In some cases, domain disputes may need to be resolved through applicable dispute-resolution procedures (such as UDRP/URS-style processes) or in court, depending on your jurisdiction and the TLD.

For trademark complaints, email:
abuse@unstoppabledomains.com (subject line: “Trademark”)


10. WHOIS / Registration Data Inaccuracy

(If applicable to your specific TLDs and data model)

What this is
Inaccurate, outdated, or false contact details provided in the domain’s registration data (e.g. invalid email, fake address).

What to include

  • Domain Name(s) concerned

  • The incorrect contact details you have identified

  • Any returned/bounced emails (with headers) if you attempted to contact the registrant


11. Other Abuse (General Abuse Reports)

What this is
Any other type of inappropriate or harmful content or activity not covered above, including but not limited to:

  • Identity theft / impersonation

  • Unauthorized redirects, framing, or IP pointing

  • Defamation

  • Terrorism/extremism propaganda

  • HYIP / Ponzi-style schemes

  • Warez / illegal distribution of copyrighted software

  • Any other content that appears to violate law or our policies

What to include

  • Abusive Domain Name(s)

  • Abusive URL(s)

  • Screenshot(s) of the abusive content

  • Short explanation of why you believe it is abusive


12. Disclosure Requests (Registration Data Requests)

What this is
Requests to obtain non-public registration data for a domain (sometimes formerly called “WHOIS data”), usually from law enforcement, regulators, or parties with a legitimate interest.


Please refer to this guide for disclosure requests. 


13. Non-Consensual Intimate Visual Depictions

What this is
Intimate visual depictions of an identifiable individual (including deepfakes or AI-generated content) shared without their consent (sometimes referred to as “revenge porn” or non-consensual intimate imagery).

What to include

  • URLs where the imagery appears

  • Any evidence that the individual did not consent to publication

  • A statement that you are the person depicted or are authorized to act on their behalf

Important:
If you or someone you know is being targeted, consider also contacting local law enforcement or an appropriate support organization.

? For these sensitive cases, you can still report via:
? abuse@unstoppabledomains.com (subject line: “NCII”)


What We Do After You Report Abuse

When we receive your report at abuse@unstoppabledomains.com, we will:

  1. Acknowledge and review

    • Confirm the domain is under our management.

    • Review the details and evidence you provided.

  2. Investigate

    • Where we have jurisdiction and authority, we investigate whether the reported activity violates our policies or applicable law.

    • For technical or complex cases (malware, hacking, etc.), we may involve security specialists.

  3. Take appropriate action
    Depending on the findings, actions may include:

    • Contacting the domain owner/registrant for remediation

    • Imposing restrictions on or suspending the domain

    • Working with relevant hosting providers or infrastructure partners

    • Escalating serious cases (e.g. child exploitation, credible threats, serious crime) to law enforcement or other competent authorities

  4. Follow-up

    • Where appropriate and feasible, we may update you or request further information.

    • Not every report will result in visible action, but all valid reports are reviewed.








Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.

Still need help?

Submit a Support Ticket

Join us on social media

with us