Skip to content
Office: Caribou, ME | (207) 200-1747 | Send A Message
Shorey IT Logo
Login
  • Services
    • Development
      • Websites and Web Applications
      • Cloud Computing
      • Clusters and Kubernetes
    • Migration and Integration
      • Integrating Into The Cloud
      • Moving From Another Provider
      • Switching Service Providers
    • Custom Solutions
      • E-Commerce
      • Security Auditing
      • Incident Response
  • Help
    • About Shorey IT
      • Business Hours
      • Partnership
      • Uptime SLA
    • Helpdesk
      • New Ticket
      • Existing Ticket
    • Feedback
      • Report Abuse
      • Report a Security Issue
      • Report Copyright Infringement
    • Schedule an Appointment
      • Virtual Consultation
      • Contact Sales
  • Blog

Abuse Report


The type of abuse that you are reporting.

Your Information


Entity Information


If you're filing this report on behalf of an entity, please enter the information below. Otherwise, skip to the next section.

Event Information


Botnet activity generally occurs when a server, including Virtual Private Servers (VPS) is observed connecting to a domain or IP address that has previously been identified as part of a botnet's server infrastructure. This report can also include discovery of C&C servers.

All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation.

What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
What time did the event happen?
If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15
Place plaintext logs of the activity, including timestamps, source IP address, and target IP/domain (if applicable).

Drag and Drop (or) Choose Files

If applicable (Max 5)

    Login Attacks typically come in the form of "brute force" attacks. Brute force is used to describe unauthorized attempts to gain access to a system, typically in numerous attempts. This type of activity typically occurs over SSH, website login, SMTP server login, etc.

    All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation.

    What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
    What time did the event happen?
    If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15
    Place plaintext logs of the activity, including timestamps, source IP address, and target IP/domain (if applicable).

    Drag and Drop (or) Choose Files

    If applicable (Max 5)

      Port Scanning is defined as malicious activity that typically consists of scans such as port scans, service scans, website directory scans, etc. This category can also include SQL injections, SMB injections, plugin exploits, user enumeration, and others.

      All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation.

      What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
      What time did the event happen?
      If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15
      Place plaintext logs of the activity, including timestamps, source IP address, and target IP/domain (if applicable).

      Drag and Drop (or) Choose Files

      If applicable (Max 5)

        We act expeditiously in response to CSAM complaints.

        We suggest reporting any CSAM to the National Center for Missing and Exploited Children ("NCMEC") in addition to reporting it with us.

        All information submitted in this report will be submitted to the US National Center For Missing & Exploited Children.

        All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation. Please note that we will not share your personal information when passing on your report for this type of abuse.

        What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
        What time did the event happen?
        If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15

        Malware, or Malicious Content, refers to hosted content that is meant to infect or harm visitors.

        All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation.

        What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
        What time did the event happen?
        If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15
        Please provide us with a direct link to the malicious content. If you have determined that the Virtual Private Server is hosting malicious content outside of a website (such as serving content over a specific port), please provide us with information on how you have determined and verified that malicious content is present.

        Drag and Drop (or) Choose Files

        If applicable (Max 5)

          Phishing websites usually impersonate popular services or banking institutions in an attempt to steal credentials, credit card information, and other personal information. These often have input fields on the page for victims to enter their information.

          All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation.

          What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
          What time did the event happen?
          If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15
          Please provide a link to the phishing website which clearly shows the phishing activity.

          Spam is unsolicited bulk messages, usually sent via email. This report type can also be used for phishing spam.

          Here is a guide for finding the headers needed for submitting a report to us.

          All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation.

          What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
          What time did the event happen?
          The email address from which the spam originated from.
          If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15
          Include the full headers of the email.

          Violent Threats and Harassment

          These reports are utilized in cases that there are imminent threats to one's safety. Please be as specific as possible when submitting your request. For example, if it's occurring at a website, please provide us with the specific link and cite the specific content in question. If an activity is occurring on a separate platform, please let us know how you were able to determine that the activity originated from Shorey IT. In addition to filing this report with us, we suggest contacting law enforcement if the is a direct threat to someone's safety.

          Our Acceptable Use Policy can be found here.

          All information submitted in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation. Please note that we will not share your personal information when passing on your report for this type of abuse.

          What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
          What time did the event happen?
          If the IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address.0 / 15
          Please explain why you believe the Acceptable use policy was violated during this event. Use as much detail as possible.

          Drag and Drop (or) Choose Files

          If applicable (Max 5)

            Other Acceptable Use Policy Violation

            These are activities that you believe violate our Acceptable Use Policy in some capacity. Please be specific in outlining what section of our policy you believe this violates as well as providing us with links leading directly to the material that you are reporting.

            All information in this report may be supplied by Shorey IT to the applicable customer(s) during the course of our investigation. Please note that we will not share your personal information when passing on your report for this type of abuse.

            What day did the event happen? If you're not sure, enter the day on which you first became aware of the event.
            What time did the event happen?
            What section of our Acceptable Use Policy (https://shoreyit.com/acceptable-use/) did the event violate?
            Please explain why you believe the Acceptable use policy was violated during this event. Use as much detail as possible.

            I certify that the information in this report is wholly true, accurate, and correct at the time of my submission.

            I consent to having this website store my submitted information so they can investigate my report.

            Save as Draft

            Services

            Development and Hosting
            Incident Response
            Migration and Integration
            Custom Solutions

            Community

            RISE for Startups
            Partner Program
            Contracted Experts
            Job Marketplace

            Company

            Privacy Focused
            Blog
            About
            Leadership

            Terms and Conditions | Privacy Policy

            Manage Cookie Preferences


            We're committed to reducing our carbon output.
            Stripe Climate Badge
            Copyright 2023 Shorey IT - All Rights Reserved.

            Registered Trademarks are property of their respective owners.
            Close Menu
            • Services
            • Help
            • Blog
            • Log In
            Cookie Notice
            We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
            Functional Always active
            The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
            Preferences
            The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
            Statistics
            The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
            Marketing
            The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
            Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
            View preferences
            {title} {title} {title}
            Cookie Notice
            This site uses cookies to deliver services. You can read how we process your data in our privacy statement or manage your preferences below.
            Functional Always active
            The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
            Preferences
            The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
            Statistics
            The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
            Marketing
            The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
            Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
            View preferences
            {title} {title} {title}