Support

How To Report Abuse

Submit An Abuse Form

Dynadot takes all abuse complaints seriously. If you come across a domain name with abusive behavior, it's important you provide concrete proof of the abuse when you submit your complaint to us. Failure to provide evidence of the abuse may cause delays in our investigation. Due to the volume of complaints we receive, you may not hear back from us unless we require more information from you.
Please be thorough when submitting an abuse complaint. To start our investigation, we require specific information depending on the type of abuse complaint. Select the type in the drop-down menu below and you'll be prompted to fill out an abuse form.
DNS Abuse means malware, botnets, phishing, pharming, and spam when spam is used to deliver any of the other four types of DNS Abuse. More Info
Submit An Abuse Form

Spam is the mass sending of unsolicited messages, often for marketing, phishing, or other online abuse. When used as a delivery mechanism for DNS abusesuch as malware, botnets, phishing, or pharmingit becomes a registrar's responsibility to address it, as defined under the broader scope of DNS abuse.

General Information

Domain Name Involved

Official Website

Full Email HeadersTo find your email headers, click here.

CommentsOptional

Verification

Note: Please be sure to contact the host provider to expedite action.

Submit An Abuse Form

Copyright Infringement is when someone uses a copyrighted work without the copyright holder's permission except for cases of Fair Use.

Please make sure Dynadot is the web host before you submit a copyright complaint under this policy. If the domain is not under Dynadot's web hosting, Dynadot will not have the technical ability to remove or disable specific items of objectionable content. In such case, we suggest that you contact the website or the party hosting the website to have this matter properly resolved. You can find out who the web host is by pinging the domain name and finding out who controls that IP address.

Step One:
Notify the domain/website owner to cease and desist. You can find the owner using the Whois lookup

I have complied and alerted the website owner.

General Information

Domain Name Involved

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

URL of copyrighted work

More info about copyrighted work you

URL of infringing work

More info about infringing work.

CommentsOptional

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

512(f) acknowledgment, Good faith belief, Authority to act:
By checking this box, you attest, under penalty of perjury, that you have a good faith belief that use of the material in this report is not authorized by the copyright owner, its agent, or the law.

You understand, under 17 U.S.C. § 512(f), you may be liable for any damages, including costs and attorneys' fees, if you knowingly materially misrepresent reported material.

You are authorized to act on behalf of the copyright owner

Verification

Note: Please be sure to contact the host provider to expedite action.

Submit An Abuse Form

Phishing A site masquerading or pretending to be another site with the intention of stealing usernames, passwords, personal and/or financial data. If the phishing was transmitted via email, please submit an abuse report under Spam Abuse to allow us to collect unique email header information needed to properly investigate the report.

General Information

Domain Name Involved

Official Website

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Full Domain Path

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

CommentsOptional

Verification

Note: The website must be live and contain a login area.

Submit An Abuse Form

Trademark/Cybersquatting is the unauthorized use of a protected trademark or service mark. As an ICANN-accredited registrar we are required to follow the Uniform Domain Dispute Resolution Policy(UDRP) set forth by ICANN

General Information

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Full Domain Path

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

Trademark Word/Symbol;

Probide the exact registered mark.

Registration Number

Probide the exact registered mark.

Registration Office

CommentsOptional

Verification

Note: As an ICANN-accredited registrar we are required to follow the Uniform Domain Dispute Resolution Policy (UDRP) set forth by ICANN

Submit An Abuse Form

Child Sexual Abuse Imagery is material that depicts maltreatment or exploitation of a child or children. We would also strongly recommend contacting the National Center for Missing and Exploited Children ("NCMEC") with a report as well.

General Information

Domain Name Involved

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Full Domain Path

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

CommentsOptional

Verification

Note: We strongly recommend contacting the National Center for Missing and Exploited Children ("NCMEC") with a report as well.

Non-Consensual Sexually Explicit Imagery abuse occurs when images depicting nudity or sexual acts are shared online without the consent of one or more of the individuals shown. To report images of an underage individual, please select Child Sexual Abuse Imagery for your report instead.

General Information

Domain Name Involved

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Full Domain Path

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

NCSEI Subject RepresentationMust select one

I attest that (1) the reported content contains nude and/or sexually explicit images of me; and (2) I did not consent to the distribution of this content.
I attest that (1) the reported content contains nude and/or sexually explicit images of a person I legally represent; and (2) the person I represent did not consent to the distribution of this content.

CommentsOptional

Verification
Submit An Abuse Form

Online Pharmacy an online rogue pharmacy, that sells prescription medication online without authorization.

General Information

Domain Name Involved

Official Website

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Full Domain Path

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

CommentsOptional

Verification
Submit An Abuse Form

Fake Whois The WHOIS data for a registered domain name is either invalid or is accurate contact data.

General Information

Domain Name Involved

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Copy of the WHOIS

CommentsOptional

Verification
Submit An Abuse Form

Fraud/Scam Deception intended to result in financial or personal gain.

General Information

Full Domain Path

Official Website

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

CommentsOptional

Verification
Submit An Abuse Form

General Information

Domain Name Involved

Official Website

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Full Domain Path

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

CommentsOptional

Verification

Note: As an ICANN-accredited registrar we are required to follow the Uniform Domain Dispute Resolution Policy (UDRP) set forth by ICANN

Submit An Abuse Form

Defamation is the act of damaging the good reputation for someone.
Libel is the act of defaming another person through writings.

General Information

Domain Name Involved

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Exact URL where the disputed content can be found

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

CommentsOptional

Verification

Note: As an ICANN-accredited registrar we are required to follow the Uniform Domain Dispute Resolution Policy (UDRP) set forth by ICANN

Submit An Abuse Form

Malware: Software created to gain access to a user's computer to steal information or turn the infected device into a drone in a larger botnet.

Botnet: A network of personal computers or devices infected with malicious software.

General Information

Domain Name Involved

Official Website

VPN/Proxy location(s) and/or user-agent(s) required to view abuseOptional

Full Domain Path

Date of malicious encounter

Name of the malicious file

A brief description of the issue

Upload ScreenshotsOptional

Upload any screenshots relevant to your report.

CommentsOptional

Verification

Subpoena Policy

Dynadot, Inc will not release customer information without the express permission of the customer or when required by law.
Are you sure you want to close the chat?Chat will be closed and the chat history will be cleared.
continue to sign out,
or stay on chat.
To review this chat session please click this windows.
Chat Online
Chat Online0