Frequently Asked Questions
If you have any questions about our Abuse Contact API, please reach out to us at [email protected].
What is Abuse Contact Data?
Abuse Contact Data refers to the information used to report misuse or malicious activity
originating from a specific IP address. It typically includes contact details for the organization responsible for
that IP
address. Such as the network administrator,
or the technical team responsible for the network operation.
Can I access all the IP Abuse Contact Data for
Academic,
Educational, or Research purposes?
Yes. Please get in touch at [email protected] from your university or research
institution
email. Explain briefly what your project is about, what you need and we will get back to you.
Where does the Abuse Contact Data come
from?
The abuse contact data is sourced from authoritative registries such as ARIN, RIPE, APNIC, LACNIC, and
AFRINIC. These regional internet registries maintain records of IP address allocations and associated contact
information.
They can also delegate abuse contact data to countries’ own abuse contact registries, such as JPNIC for Japan.
How to access Abuse Contact Data in bulk?
To access abuse contact data in bulk, you can use our API with a higher rate limit plan or download our
periodic data dumps.
For more information on bulk access options, please contact us as [email protected].
How to report IP Abuse?
To report IP abuse, gather evidence of the abusive activity, identify the IP address involved, and contact the abuse
team
of
the ISP or network owner. You can use our IP Abuse Contact lookup tool to find the appropriate contact information.
How do I know if I am experiencing an IP abuse
incident?
You may be experiencing an IP abuse incident if you notice unusual network activity, receive reports of spam or
malicious
content originating from your IP, or detect unauthorized access attempts. Monitor your logs, use intrusion detection
systems,
and stay alert to any abnormal patterns in your network traffic.
What are the most common types of IP Abuse?
Denial of Service (DoS) attacks are the most common type of IP abuse. They often originate from several IP addresses,
which we
call a Distributed Denial of Service (DDoS) attack.
How does a Distributed Denial of Service (DDoS) attack
work?
DDoS attacks work by using many compromised computers to send a lot of fake traffic to a website or service. These
compromised computers can be regular PCs, smartphones, or even smart home devices connected to the internet.
Think of a DDoS attack like this: Imagine a bunch of people decided to block a store's entrance. They crowd around the
door,
making it
hard for real customers to get in. That's basically what a DDoS attack does to a website - it floods it with so much
fake
traffic that
real users can't access it.