Abuse Reporting & Handling Policy

Last Updated: 10 March 2025

Status: Website‑posted policy (not separately signed)
Contact: [email protected]

This Policy explains how to report abuse related to our network and Services, what evidence to include, how we respond, and potential enforcement actions. It complements our General Terms of Service and Acceptable Use Policy (AUP). If there is a conflict, the General Terms control; where the AUP is more protective or restrictive for security or lawful use, the AUP controls.


1. What Is “Abuse” Under This Policy

Abuse includes, without limitation:

Note: We are a neutral infrastructure provider. We do not collect or store Customer Content or personal data processed via the Services, and we do not have routine access to customers’ data or systems. We cannot monitor customer content or grant access to it. Any request for customer data requires valid legal process.


2. How to Report Abuse

Email: [email protected]
Subject line format: ABUSE: <type> – <IP/Host/Domain> – <date UTC>

Include as much of the following as possible:

To protect privacy (including GDPR) and reduce malware/IP‑tracking risks, we accept attachments only in .txt (plain text), .pcap (packet captures), or .png/.jpg/.jpeg (screenshots). Do not send archives or binary/document formats (e.g., .zip, .rar, .7z, .exe, .dll, .pdf, .docx/xlsx, .eml, disk images, or cloud links). If other evidence is necessary, our abuse desk will request it and provide instructions.


3. Category‑Specific Requirements


4. Our Process & Response Times


5. Enforcement Actions (Consequences)

If a report is validated or the customer fails to remediate on time, we may take one or more actions, at our discretion:

We may take immediate protective action without prior notice for S0/S1 cases.


6. Preservation, Data Access & Privacy


7. Law‑Enforcement & Legal Requests

Law‑enforcement and regulatory bodies may use [email protected]. Please include: agency name, case number, legal authority, specific identifiers (IP/host/domain), and time range (UTC). We require valid legal process for any disclosure. Emergency requests should be clearly labeled EMERGENCY in the subject line.


8. Bad‑Faith or Incomplete Reports

We may close or deprioritize reports that lack sufficient evidence, are frivolous, or appear to be in bad faith. Repeat abusive reporting may be blocked.


9. Relationship to Other Documents

This Policy complements our General Terms, AUP, and Privacy Policy. By using the Services, customers agree to comply with those documents. Where this Policy is silent, those documents apply.


10. Abuse Report Email Template

You can copy/paste the following and email it to [email protected]:

Subject: ABUSE: <type> – <IP/Host/Domain> – <date UTC>

Your name & organization:

Contact email & phone:

Authority (if reporting for a rights holder / LE):

Type of abuse (pick one): Security / Network / Email / Phishing / Malware / Infringement / Privacy / Other

Incident summary (2–5 sentences):

Affected IP/Host/Domain:

Timestamps (UTC) and time zone:

Evidence (attach .txt/.pcap/.png/.jpg):

Volume/scale (messages, bandwidth, targets):

Desired action (takedown, block, notify customer, other):

Legal basis (if any):

I certify that the information provided is accurate and that I am authorized to submit this report.

Signature (type your name):

Date (UTC):


11. Updates to This Policy

We may update this Policy from time to time. Each version is dated on this page. Material changes will be highlighted. Continued use of the Services after an update constitutes acceptance.