Domain Name Abuse Report (DNS Abuse Report)

At Atak Domain, in accordance with ICANN’s current regulations, we implement a fast and effective procedure to prevent domain name abuse (DNS Abuse).
You can report DNS abuse through this page.

What is DNS Abuse?

  • Phishing
  • Malware distribution
  • Botnet usage
  • Pharming (DNS redirection attacks)
  • Spam (only when used to propagate the above abuse types)

Commercial disputes, copyright claims, and similar issues outside this scope must be pursued via ICANN's UDRP process or relevant legal channels.

How to Submit Your Report?

You can use the following communication channels to report abuse:

Note: No login is required to use the web form.

Information to Include in Your Report

  • Description of the abuse
  • Affected domain name (e.g., exampledomain.com – must be in the email subject line)
  • Full URL where the incident occurred (if applicable)
  • Evidence (e.g., screenshot, defanged URL, etc.)

Actions Taken Upon Report

Upon receiving your report:

  • You will receive an automatic confirmation of receipt.
  • This confirmation will include:
  • Date of report receipt
  • Subject of the report (relevant domain name, etc.)
  • Ticket ID

Investigation and Intervention Process

Case Action
Phishing, Malware, Botnet If sufficient evidence is found, the domain is suspended (clientHold). Registrant is notified. Transfer lock may be applied if necessary.
Compromised websites/subdomains Registrant is notified and given time to fix the issue. If not resolved, intervention occurs.

Response Timeline

  • Urgent Threats: Immediate or no later than 2 business days after checks
  • Compromised Sites: Within 3 business days
  • Mass or critical threats (e.g., botnets): Within 6 hours or coordinated with authorities

Record Keeping and Reporting

All actions and communication are recorded and kept ready for ICANN audits.
Records are stored for at least 2 years.

Contact for Official Authorities

Requests from official authorities are processed promptly via: [email protected]
Legal processes and formal requests are assessed separately.

Legal Notice

Requests outside the scope of DNS Abuse, such as legal or trademark disputes, are not handled through this process.
These issues must be resolved through UDRP or court proceedings.

1. Investigation and Correction Process for Inaccurate WHOIS Information

According to ICANN regulations, Atak Domain is responsible for the accuracy of WHOIS data. Any inaccuracy report follows this process:

  • Investigation begins within 2 business days of receiving the report. The Registered Name Holder (RNH) and Customer Account Holder (CAH) are notified via email.
  • The RNH/CAH has 7 days to provide documentation verifying the WHOIS accuracy.
  • Depending on the outcome:
    • If valid: process is closed.
    • If outdated/incorrect: information is updated and process is closed.
    • If no or insufficient documents: domain may be suspended or deleted due to unresolved inaccuracy.

Note: Both the registrant and registrar are responsible for keeping WHOIS data accurate and up-to-date.

2. Cybersquatting and Trademark Infringement Reports

As an ICANN-accredited registrar, Atak Domain handles trademark infringement and cybersquatting reports neutrally.

  • The RNH and CAH are notified within 2 business days of receiving a complaint.
  • If WHOIS is public, it's shared with the complainant.
  • If WHOIS is hidden but available internally, the complainant is guided on how to proceed.
  • If WHOIS is protected under GDPR, the complainant must submit a formal, GDPR-compliant written request.

Important: Atak Domain is only a technical and administrative intermediary. Without a court order or a valid ICANN UDRP decision, Atak Domain is not authorized to suspend, delete, or transfer domain ownership.

UDRP Application Page

Types of Abuse

Abuse Type Description
PhishingA site pretending to be another to steal login/personal information.
Privacy concernsFor GDPR or personal data issues.
MalwareSite or URLs distributing malware or viruses, including hacking tools.
Network abuseSites executing network attacks like brute force or DoS.
SpamUnsolicited emails or SMS (e.g., bank transfer scams).
Copyright complaintsUnauthorized use of copyrighted materials hosted on Atak Domain services.
Trademark complaintsUnauthorized use of trademarked content on Atak Domain services.
Domain disputesReview ICANN’s Uniform Domain-Name Dispute-Resolution Policy.
Invalid WHOISSuspected fake registration information.
Content complaintsDisturbing imagery, violence, etc.
Suspicious pharmacy contentQuestionable pharmaceutical content on a website.
Personal data exposureContent displaying SSNs, credit card numbers, etc.
Tech support scamsFake support sites not engaging in phishing but misleading users.
Child abuseContent promoting or involving the abuse of children.