Report Abuse
At Unstoppable Domains, we take abuse reports seriously to ensure the safety and integrity of our platform.
Abuse can include inappropriate content, malware, phishing, spam, and other harmful activities.
When reporting an abuse, please include the following information:
- A domain name involved in abuse (e.g. 'some-violation.com')
- A detailed description of the issue, including any relevant evidence to support your claim.
- Abuse-specific information (please see a full list below)
To report abuse, email us at abuse@unstoppabledomains.com.
Common types of abuse and evidence requirements:
1. Abuse reports refers to any inappropriate content, including but not limited to identity theft, unauthorized redirects/frames/IP pointing, defamation, terrorism propaganda, high-yield investment programs (HYIP), warez, and more. |
|
2. Child abuse material includes any adult content depicting minors (individuals under 18 years of age). |
|
3. Copyright/DMCA refers to content protected by copyright that is published online without proper authorization or rights. |
|
4. Email Abuse/Spam refers to unsolicited bulk commercial emails, including 'spamvertising', which involves promoting domains through spam sent from another network. Legitimate emails comply with the requirements of the CAN-SPAM Act. |
|
5. Fraud involves wrongful deception with the intent to obtain monetary benefits (commonly referred to as a scam) or other advantages, such as access to personal information. |
|
6. Hacking activity is networking attacks such as port scanning, brute force, denial of service attacks, etc. with the intent to infect or exploit the victim’s resources, or for other illegal purposes. |
|
7. Illegal pharmacy is a website that sells or distributes medications with no valid prescription, outdated, substituted or counterfeit medications, thus violating the law. |
|
8. Malware is malicious software designed to disrupt computer operations, collect sensitive data, or gain unauthorized access to private computer systems. |
|
9. Phishing is a form of fraud designed to acquire sensitive information (such as usernames, passwords, PINs, credit card, or bank account details) by using fake websites that closely resemble legitimate ones. |
|
10. Trademark infringement is the unauthorized use of a trademark or service mark in connection with goods and/or services, which is likely to cause confusion, deception, or a misunderstanding about the origin of the goods and/or services. |
|
11. WHOIS inaccuracy refers to incorrect, outdated, or false contact information listed in the WHOIS database. |
|