Abuse Contact Data for
IP Addresses

Network Abuse Reporting

Our Abuse Contact API delivers comprehensive data on the abuse contacts associated with every IP address on the Internet. Both for IPv4 and IPv6 addresses.

For each IP address, we provide:

  • Name
  • Email address
  • Phone number
  • Fax number
  • Address
  • Country
  • ISO Alpha-2 Country
  • Network Range
  • Link to the authoritative registry entry

Applications of our Abuse Contact Data

  1. Gather information to facilitate the takedown of malicious web entities.
  2. Investigate IP addresses attempting unauthorized access to your accounts.
  3. Trace hackers or spammers targeting you or your organization.
  4. Combat identity theft and other forms of harassment or infringement.
  5. Lay the groundwork for legal action against malicious IP addresses.
  6. Automate complaints to companies responsible for abusive IP addresses.

Frequently Asked Questions

If you have any questions about our Abuse Contact API, please reach out to us at [email protected].


What is Abuse Contact Data?

Abuse Contact Data refers to the information used to report misuse or malicious activity originating from a specific IP address. It typically includes contact details for the organization responsible for that IP address. Such as the network administrator, or the technical team responsible for the network operation.

Can I access all the IP Abuse Contact Data for Academic, Educational, or Research purposes?

Yes. Please get in touch at [email protected] from your university or research institution email. Explain briefly what your project is about, what you need and we will get back to you.

Where does the Abuse Contact Data come from?

The abuse contact data is sourced from authoritative registries such as ARIN, RIPE, APNIC, LACNIC, and AFRINIC. These regional internet registries maintain records of IP address allocations and associated contact information. They can also delegate abuse contact data to countries’ own abuse contact registries, such as JPNIC for Japan.

How to access Abuse Contact Data in bulk?

To access abuse contact data in bulk, you can use our API with a higher rate limit plan or download our periodic data dumps. For more information on bulk access options, please contact us as [email protected].

How to report IP Abuse?

To report IP abuse, gather evidence of the abusive activity, identify the IP address involved, and contact the abuse team of the ISP or network owner. You can use our IP Abuse Contact lookup tool to find the appropriate contact information.

How do I know if I am experiencing an IP abuse incident?

You may be experiencing an IP abuse incident if you notice unusual network activity, receive reports of spam or malicious content originating from your IP, or detect unauthorized access attempts. Monitor your logs, use intrusion detection systems, and stay alert to any abnormal patterns in your network traffic.

What are the most common types of IP Abuse?

Denial of Service (DoS) attacks are the most common type of IP abuse. They often originate from several IP addresses, which we call a Distributed Denial of Service (DDoS) attack.

How does a Distributed Denial of Service (DDoS) attack work?

DDoS attacks work by using many compromised computers to send a lot of fake traffic to a website or service. These compromised computers can be regular PCs, smartphones, or even smart home devices connected to the internet.

Think of a DDoS attack like this: Imagine a bunch of people decided to block a store's entrance. They crowd around the door, making it hard for real customers to get in. That's basically what a DDoS attack does to a website - it floods it with so much fake traffic that real users can't access it.