You can use this page to file an abuse report about a domain registered with us. Before doing so, it is extremely important that you understand our policies and the services we do and do not provide.
Key Takeaways
- Use the Official Form – Always use the dedicated Abuse Report Form for the most efficient processing. Email submissions may be redirected to this form.
- Provide Evidence – All reports must be supported by clear and concrete evidence. The type of evidence required varies by the nature of the abuse.
- Support Code – Obtain a support code from the linked article for each complaint type before submission. The support code confirms that the report has been prepared with the required information and enables efficient and timely investigation. Submissions without a valid support code may not be processed.
- Response Time – Expect an average response time of 24 to 72 hours. Complex cases may take up to 30 days.
- Legal Limitations – We do not determine the legality of website content and will only act on clear violations of our terms or upon direction from legal authorities.
TABLE OF CONTENTS
- Key Takeaways
- General Reporting Guidelines
- DMCA, Copyright & Trademark Complaints
- Phishing & Pharming
- Malware & Botnets
- Hacking Activity
- Spam & Email Abuse
- Pharmacy Complaint
- Hijacking & Domain Name Dispute
- CSAM (Child Abuse)
- Invalid Whois
- Other Illegal Activities, Scams & Fraud
- Someone is Saying Something About Me that I don’t like...
- Privacy Concerns
- Submitting an Abuse by Email
- Please Keep In Mind
- What Happens Next?
- Reporting Grievances From India
If you need to report a domain name, email address, or IP address that is involved in illegal or abusive activity, here are some tips to help make the process easier. Expect an average response time of 24 to 72 hours, although some complex cases may take up to 30 days before we get back to you.
Note
The primary way to report abuse to Trustname is by using the abuse reporting form linked to from this page. Our automated systems and team are designed to ensure that your report is acted upon promptly. Trustname is generally unable to process complaints submitted to us by email.
ICANN
According to ICANN's guidelines, in most cases, in order to take action against a domain, the registrar of record must be presented with a valid court order or the registrant's consent. If a registrar cannot determine what abuse is taking place, cannot verify or confirm the abuse, or if the activities fall outside the registrar's abuse policy, the registrar will be unlikely to take action.
Important
As an ICANN-accredited domain registrar, Trustname’s primary role is the registration and management of domain names. We do not host websites, operate email services, or control server infrastructure.
Trustname is not a court or adjudicative authority for trademark, copyright, or other intellectual property disputes. Such matters should be addressed through appropriate legal mechanisms (e.g., UDRP proceedings or competent courts). Where appropriate, individuals may also contact relevant law enforcement authorities regarding suspected illegal activity.
Remember to contact the hosting provider
For issues related to website content, email services, server files, fraud activity, malware distribution, or other conduct occurring on hosted infrastructure, the web hosting provider generally has direct operational control over the affected systems. As a result, they are often in the best position to investigate and mitigate such issues promptly.
However, reports of DNS Abuse — including malware, botnets, phishing, pharming, and spam used as a vector for these threats — may be submitted directly to Trustname and will be reviewed in accordance with our obligations under the ICANN Registrar Accreditation Agreement (RAA).
Trustname evaluates each report on a case-by-case basis and may take appropriate action within the scope of its authority, while seeking to avoid unnecessary disruption or false positives.
We do not determine the legality of site content and will only act when directed to do so by legal authorities or in clear cases of violation of our terms and conditions, such as selling opioids online, child pornography, or unethical use of minors in any way. If you still believe that Trustname can help you, you should always use our dedicated abuse report form, as this is the proper way to submit abuse reports.
As an ICANN-accredited domain registrar, Trustname’s primary role is the registration and management of domain names. We do not host websites, operate email services, or control server infrastructure.
Best Practices for Abuse Report Submission
Preferred Email Sources
Abuse reports submitted from free or anonymous email services (e.g. @gmail.com, @proton.me) are subject to additional scrutiny. To ensure efficient processing and verification, we strongly recommend that organizations, particularly those in security, brand protection, or law enforcement, submit reports from a verifiable corporate or institutional email domain.
DNS Abuse vs. Content-Level Disputes
Trustname is a fully ICANN-accredited domain name registrar providing secure domain registration and management services. It is important to distinguish the role of a registrar from that of a hosting provider: registrars are generally not the appropriate venue for addressing concerns regarding specific website content. Because any action taken by a registrar affects the entire domain, such measures are often disproportionate and ineffective for content-level disputes.
The following list explains the most common types of abuse we investigate and the evidence we need from you to support our investigation. Following these guidelines will help us investigate and respond to abuse complaints more effectively.
DMCA, Copyright & Trademark Complaints
Description
Copyright/DMCA is the content that is protected by copyright being published online with no authorization rights. Trademark Infringement is the unauthorized use of a trademark or service mark on or in connection with goods and/or services in a manner that is likely to cause confusion, deception, or mistake about the source of the goods and/or services.
Useful evidence and additional information are needed to report:
- An official DMCA take down notice or formal notice of trademark infringement that meets all DMCA requirements as set forth in our Copyright and Trademark Policy.
Steps required to submit a report:
- Carefully review the DMCA, Copyright & Trademark Complaints Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing, please submit the Abuse Report Form - DMCA, Copyright & Trademark Complaints.
- UDRP/URS disputes are submitted using our special UDRP form.
Notes and advice:
- In the case of a trademarked domain name, we recommend that you seek resolution through the UDRP or URS in accordance with ICANN's Dispute Resolution Policy.
- Alternatively, you may pursue the matter in a U.S. court of competent jurisdiction.
Phishing & Pharming
Description
A site that pretends to be another site, or a fake site that looks almost identical to a legitimate site, with the intent of stealing personal identification information (usernames, passwords, PINs, credit card or bank account information).
Useful evidence and additional information needed to report:
- Abusive Domain Name(s).
- Target of the attack (legitimate domain or website URL).
- Country your IP address belongs to (the content may be geo blocked, so we will try using the corresponding proxy).
- User-agent (mobile phone, PC) and browser (the content may vary depending on the device and software).
- If possible, an example phishing email, including the full email header information.
Steps required to submit a report:
- Carefully review the Phishing & Pharming Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint. Abuse reports without a valid code will be discarded.
- For more efficient processing, please submit the Abuse Report Form - Phishing & Pharming.
Notes and advice:
- The website must be live and contain a login area.
- If you clicked on a link or opened an attachment from a suspected phishing email, then you should run a virus check on your computer just to be safe.
Malware & Botnets
Description
A site that participates in malware or virus distribution, or URLs to download. You can also report sites that promote, encourage, or engage in computer or network hacking and cracking. It can be also any kind of software used to disrupt computer operations, gather sensitive data, or gain access to private computer systems.
Useful evidence and additional information are needed to report:
- Abusive Domain Name(s).
- Abusive URL(s) with full domain path. Example: hxxps://example.com/malware.
- Evidence of the distribution of malware.
Steps required to submit a report:
- Carefully review the Malware Botnets Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing please submit the Abuse Report Form - Malware, Botnets & Spam.
Hacking Activity
Description
Networking attacks such as port scanning, brute force, denial of service attacks, etc. with the intent to infect or exploit the victim’s resources, or for other illegal purposes.
Useful evidence and additional information are needed to report:
- Abusive Domain Name(s).
- Abusive URL(s) with full domain path. Example: hxxps://example.com/hacking.
- Abusive IP address.
- Date and time (including the time zone) of when the abuse took place.
- Full unmasked log of the attack generated by your firewall (with the source and destination IPs/domains, user-agent, timestamps and time zone).
Steps required to submit a report:
- Carefully review the Malware & Botnets Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing please submit the Abuse Report Form - Hacking Activity.
Spam & Email Abuse
Description
Unsolicited or unwanted email, texts or SMS messages. This also includes "Spamvertising", i.e. advertising domains via spam sent from another network.
Useful evidence and additional information are needed to report:
- A copy of a spam email, including:
- "From" Address.
- "To" Address.
- Full Email Headers.
- Email Content.
Steps required to submit a report:
- Report to FTC.
- Carefully review the Spam Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing please submit the Abuse Report Form - Malware, Botnets & Spam.
Notes and advice:
- Legitimate emails are those complying with the requirements of the CAN-SPAM Act.
Pharmacy Complaint
Description
An illegal or rogue online pharmacy is a website that sells or distributes Rx medications with no valid prescription, outdated, substituted, or counterfeit medications, thus violating the law. This includes opioids.
Useful evidence and additional information are needed to report:
- Abusive Domain Name(s).
- Abusive URL(s) with full domain path. Example: hxxps://example.com/oxy.
- Screenshot of the abusive page.
Steps required to submit a report:
- Carefully review the Pharmacy Complaint Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing, please submit the Abuse Report Form - Pharmacy Complaint.
Notes and advice:
- Please note that a site may look like a fake pharmaceutical site, but still be licensed to do business in another jurisdiction. After all, the Internet is global.
- We only take strict immediate action against sites that distribute opioids, including synthetic opioids such as fentanyl, and pain relievers that are legally available by prescription, such as oxycodone (OxyContin®), hydrocodone (Vicodin®), codeine, morphine, and similar.
Hijacking & Domain Name Dispute
Description
Please refer to ICANN's Uniform Domain Name Dispute Resolution Policy for a full definition. This generally involves unauthorized changes to domain registration details or transfer of a domain.
Steps required to submit a report:
- Carefully review the Hijacking & Domain Name Dispute Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing please submit the Abuse Report Form - Hijacking & Domain Name Dispute.
CSAM (Child Abuse)
Description
Material found on a website that promotes, encourages, or engages in the exploitation or abuse of children. Also, any adult content depicting minors (someone under the age of 18).
Useful evidence and additional information needed to report:
- Abusive Domain Name(s).
- Abusive URL(s) with full domain path. Example: hxxps://example.com/csam.
- DO NOT send examples to the registrar.
Steps required to submit a report:
- Carefully review the CSAM (Child Abuse) Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing please submit the Abuse Report Form - CSAM (Child Abuse).
Notes and advice:
- All concerns about child abuse or exploitation material must be sent to the appropriate national authority.
Invalid Whois
Description
You suspect a domain has been registered with fake, inaccurate, outdated or false information listed in Whois.
Useful evidence and additional information needed to report:
- Abusive Domain Name(s).
- Incorrect Contact Details.
- Because the registrant is not required to respond to an email, phone, or postal request, we will need clear evidence that the email is invalid (such as a bounce or a returned email with the header), the phone is invalid (such as a disconnect), or the mail was returned as undeliverable.
Steps required to submit a report:
- Go to our Whois Domain Lookup page and search for the domain.
- Сarefully review the Inaccurate Whois Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing please submit the Abuse Report Form - Inaccurate Whois.
Notes and advice:
- Whois privacy protection and proxy services such as Njalla or Harakiri are allowed according to their TOS and agreement with a user (actual domain registrant).
- The reports related to this kind of inaccurate Whois data will be ignored as ICANN allows the use of such services.
- If your information has been used for an invalid registration, please let us know.
Other Illegal Activities, Scams & Fraud
Description
Wrongful deception intended for monetary gain (scams) or to access personal details, along with other inappropriate content like identity theft, unauthorized redirect/frame/IP pointing, defamation, terrorism, propaganda, High-Yield Investment Programs (HYIP), warez, and similar activities, all fall under prohibited content.
This also includes disturbing imagery, violence, and the display of sensitive personal information such as social security numbers or credit card details.
Useful evidence and additional information are needed to report:
- Abusive Domain Name(s).
- Abusive URL(s) with full domain path. Example: hxxps://example.com/fraud.
- Abusive URL(s).
- Paid invoices or receipts.
- Screenshot of the abusive page.
- Email with full header and body (in case of email fraud).
Steps required to submit a report:
- You should always first report illegal activity to your local law enforcement authorities.
- Carefully review the Terrorism and Other Illegal Activities Reporting Process.
- Obtain a support code number from the article, which is necessary for the submission of a complaint.
- For more efficient processing please submit the Abuse Report Form - Other Illegal Activities.
Notes and advice:
- If you believe you are the victim of an Internet crime, or if you are aware of an attempted crime, you can file a complaint through the Internet Crime Complaint Center.
- You may also contact your lawyer or your local authorities in order to get the issue resolved.
Someone Is Saying Something About Me That I Don't Like...
Description
This applies when someone is saying something about you that you do not like, which may include defamatory content.
Useful evidence and additional information are needed to report:
- Abusive Domain Name(s).
- Abusive URL(s) with full domain path. Example: hxxps://example.com/sh*t.
Steps required to submit a report:
- Carefully review this article.
Notes and advice:
- You should always report illegal activity to your local law enforcement agency.
- Additionally, you can submit a report to the domain name registrant asking to remove the content you don’t like and explaining why.
Privacy Concerns
For concerns regarding Privacy or GDPR, please refer to our Privacy Policy or get in touch privacy@trustname.com.
Submitting An Abuse By Email
If you email us a complaint via abuse@trustname.com, you will likely receive an automated response directing you to use the abuse reporting form instead. Incomplete or misdirected complaints sent through the email channel burden registrar abuse teams, resulting in slower response times to actionable complaints.
As always, please support your allegations with concrete evidence and/or any other relevant information to verify the abuse incident and help us take appropriate action. Keep in mind that evidence may vary depending on the type of issue you’re reporting.
Please Keep In Mind
- We can’t guarantee any particular outcome, but we’ll review your complaint and contact you only if necessary.
- Your complaint will be evaluated for merit and acted on where appropriate.
- You will not receive updates regarding the evaluation or outcome of the complaint.
- We reserve the right to use your complaint to substantiate the abuse to our customers when necessary.
- Complaints are tracked by our team for the purposes of improving anti-abuse processes and threat mitigation.
- If you submit your report using the abuse reporting form, additional submissions from your email address within 24 hours won’t receive another notice of receipt.
What Happens Next?
When we receive abuse complaints via our Abuse Reporting Form, we follow the steps outlined below:
- We determine whether the complaint is directly related to the use of our services. For example, since we do not provide website hosting, we are not the party storing or distributing allegedly infringing content, sending emails that you may consider spam, etc. Nameserver information can often be used to identify a web hosting provider, so that a complaint can be submitted to them.
- If the complaint is directly related to our services, we will contact the registrant and/or account holder and ask them to respond to the complaint within 72 hours. If they respond and we are satisfied that their response does not violate our Terms of Use, we will close the complaint. Why?
- If we do not receive a response from the account holder or registrant within 72 hours, and we find the report(s) in the complaint to be in violation of our terms, we may take additional action at that time.
Reporting Grievances From India
Please report abuse using our existing reporting procedures as outlined above via our abuse reporting form. For anything outside of this scope, please contact our Grievance Officer by email at lea@trustname.com.
Fewmoretaps OU d/b/a Trustname.com
ATTN: Grievance Officer
Roseni tn 13
Tallinn, 10111
Estonia