What We Accept
We accept reports for the following types of malicious content:
- Phishing sites - Fake websites impersonating legitimate services
- Malware distribution - Sites hosting viruses, trojans, or ransomware
- Scam websites - Fraudulent e-commerce or investment scams
- Botnet C&C servers - Command and control infrastructure
- Exploit kits - Tools designed to exploit vulnerabilities
What We Don't Accept
- Personal disputes - Issues between individuals
- Copyright violations - Use DMCA process instead
- Spam emails - Unless they contain malicious links
- Legitimate websites - Even if you disagree with their content
Priority Levels
We prioritize reports based on threat level and potential impact:
- HIGH - Active malware campaigns, widespread phishing
- MEDIUM - Targeted phishing, smaller scale threats
- LOW - Dormant or low-impact threats
Required Information
Include as much detail as possible to help us process your report quickly:
- URL - Full URL of the malicious site.
- Threat Type - Phishing, malware, scam, etc.
- Severity - The severity of the attack.
- Description - Description of the attack.
Example Report:
URL: https://paypalscam.example.com/login
Type: Phishing
Severity: Medium
Description: Fake PayPal login page stealing credentials
Processing Timeline
- Initial Review: Within 2 hours
- Analysis: 1-4 hours for high priority
- Takedown Initiated: 2-6 hours average
- Complete Removal: 2-48 hours depending on host response
Evidence Guidelines
Strong evidence significantly speeds up processing:
- Provide us with the targeted brand for easier understanding
- Provide us with any email adresses used to spread the malicious site
- Capture any error messages or suspicious behavior
- For malware, include hash values if you have them
- Network logs or traffic captures are valuable
Your Privacy
We respect your privacy and security:
- Anonymous reports are accepted
- Your contact info is only used for updates
- We never share reporter information with targets
- All data is encrypted and stored securely