How To Report IP Abuse

How and when do I report IP abuse?

If you manage a network, website, or have a device connected to the internet.  Moreover, that it is getting attacked from an IP address or multiple IP addresses.  Firstly, you need to know how to report IP abuse.

Chances are the IP address that you are seeing abusing your connection, isn't that of the hacker/malware that is attempting to compromise your network/website. Often times the owner of the IP address isn't aware that their computer is being used as a host.   That is to say to scan/attack other networks, devices, or websites.  Moreover, you find the IP address of the attacker by doing an IP Address Lookup.  Subsequently, don't assume that's the person attacking you.  You should consider the fact that they've been hacked.  To clarify, their device is being used without their knowledge.

Here's what you should do:

  1. First, review your logs to find the IP address or addresses you feel are attempting to compromise your connection.
  2. Second, use our IP Whois Lookup tool to find out more about the network to which the IP address(es) are assigned.
  3. Third, within the IP Whois Lookup returned results there will be an email address of the assignee of the IP address. Usually this email is [email protected][]
  4. Last, use the email address provided to report your findings. The more detail you can provide, the better.

REMEMBER, the IP address you find most likely DOES NOT belong to the abuser themselves. So be kind in your email. The person controlling the devices doing the attacking will most likely thank you for alerting them and close the connection and secure their device. They in turn will review their logs to find where the connection came from and report abuse to the point of contact for the offending IP address(es).

Related Articles

Zoom Safety Tips - Products like Zoom and other remote meeting services are in high demand. However, the increased user base has also led to worrying breaches in security.

How To Avoid Email Phishing Scams - We've all gotten emails that look to be from a reputable source but it may be a email phishing scam. Be sure to analyze the email to be completely sure!

Proxy Server Detection and Blocking - Why Detect Proxy Servers? Anonymity is readily obtained online. Proxy server detection helps overcome someones hidden identity to assist webmasters.