Home » Abuse Reporting

NetBeacon Reporter

NetBeacon Reporter is a free tool that simplifies DNS Abuse reporting for individuals and organizations and provides domain registrars with the information and tools they need to act confidently.

How to report abuse

Sharing online abuse via NetBeacon Reporter is the most impactful action you can take because the information is delivered to the right place—the organizations that can take action to prevent further abuse.

null

Sign up or login to the NetBeacon abuse reporting tool with your email or SSO.

null

Select the type of abuse and share any details that might help investigators.

null

Your report will be standardized, enriched, and shared with the appropriate entities for action.

Anyone can Report DNS Abuse

Internet Users

Anyone that happens upon or falls victim to DNS Abuse can and should use NetBeacon Reporter. Abuse reports are then shared with registrars who will use the information provided to identify and take action against online abuse.

Law Enforcement Agencies

Law enforcement officials who receive reports of online abuse (i.e., scams, phishing attempts, spam, botnets) can either refer complainants to NetBeacon Reporter or report online abuse directly. Both methods will deliver the report and flag the incident with registrars to investigate and take action where appropriate.

Consumer Protection Agencies

NetBeacon Reporter replaces many of the ad-hoc methods used by the agencies whose mandate includes protecting people from certain online harms. With NetBeacon Reporter, agencies can report DNS Abuse knowing that the report will reach the appropriate parties who can investigate and take action.

Internet Security Agencies

NetBeacon Reporter greatly simplifies online abuse reporting for Internet security and threat intelligence agencies. NetBeacon Reporter replaces numerous, often ad-hoc processes, allowing agencies to report phishing, spam, botnets, malware and other scams and consumer fraud attempts to the appropriate parties.

What is DNS Abuse?

DNS Abuse is defined as being "composed of five broad categories of harmful activity insofar as they intersect with the DNS: malware, botnets, phishing, pharming, and spam (when spam serves as a delivery mechanism for those other forms of DNS Abuse).”

Phishing

Phishing attempts to trick people into sharing important personal information—banking information, logins, passwords, credit card numbers. Information gained in phishing attempts can be sold and used to defraud individual victims

Malware

Malware is software that is created to gain access to a user’s computer to steal information or turn the infected device into a drone in a larger botnet. Malware can appear as legitimate software but with changed code users may not notice.

Botnets

A botnet is the name given to a network of personal computers or other devices that are infected with malicious software without the individual user’s knowledge. Botnets can be used to send spam and in online attacks against websites or institutions.

Spam

Spam is a volume game and is broadly defined as messages that are sent en masse to as many people as possible. Spam is often used to send inappropriate or irrelevant marketing messages, phishing attempts and other attempts at online abuse.

Phishing

Phishing attempts to trick people into sharing important personal information—banking information, logins, passwords, credit card numbers. Information gained in phishing attempts can be sold and used to defraud individual victims.

Malware

Malware is software that is created to gain access to a user’s computer to steal information or turn the infected device into a drone in a larger botnet. Malware can appear as legitimate software but with changed code users may not notice. 

Botnets

A botnet is the name given to a network of personal computers or other devices that are infected with malicious software without the individual user’s knowledge. Botnets can be used to send spam and in online attacks against websites or institutions. 

Spam

Spam is a volume game and is broadly defined as messages that are sent en masse to as many people as possible. Spam is often used to send inappropriate or irrelevant marketing messages, phishing attempts and other attempts at online abuse. 

Phishing

Phishing attempts to trick people into sharing important personal information—banking information, logins, passwords, credit card numbers. Information gained in phishing attempts can be sold and used to defraud individual victims

Malware

Malware is software that is created to gain access to a user’s computer to steal information or turn the infected device into a drone in a larger botnet. Malware can appear as legitimate software but with changed code users may not notice.

Botnets

A botnet is the name given to a network of personal computers or other devices that are infected with malicious software without the individual user’s knowledge. Botnets can be used to send spam and in online attacks against websites or institutions.

Spam

Spam is a volume game and is broadly defined as messages that are sent en masse to as many people as possible. Spam is often used to send inappropriate or irrelevant marketing messages, phishing attempts and other attempts at online abuse.

Where does reported
abuse go?

DNS Abuse reports entered into NetBeacon Reporter are converted into an Internet industry standard format, referenced across a number of online abuse databases, and appended with the results. The report is standardized and enriched and is then sent to the appropriate domain registrar or registry for investigation and action.

How to receive abuse reports

Domain registrars and registries can receive enriched abuse report data via email or API. Create an account today and claim your ICANN credential to customize your settings.

Latest News

Read about the latest news and research concerning DNS Abuse.

Currently, NetBeacon accepts and distributes reports of malware, phishing, botnets, and spam. As we bring more features online, we will expand the list of reportable harms.

Currently, you CANNOT use NetBeacon to attempt to report Child Sexual Abuse Materials (CSAM). Doing so could be a crime and you will be reported to law enforcement. If you have CSAM to report, please visit https://www.iwf.org.uk/report/ or your relevant local authority.

Anyone anywhere can use NetBeacon Reporter to report malware, phishing, botnets, and spam. You do not need to be in cybersecurity or law enforcement. You will need to provide a working email address, and you will need to provide specific pieces of information to submit a report.

Your report is converted into an Internet industry standard format called XARF. The URL you submit is then checked across a number of online abuse databases, and the results appended to your report. This standardized, enriched report, including your email, is then sent to the appropriate domain registrar or registry for investigation, and potentially, action.

No. NetBeacon Reporter is not a service for law enforcement investigations or judicial processes. It is a service for simplifying the generation of reports to disrupt online harms.  

The organization that receives your abuse report may reach out to you for clarification or for more information.

No. Thousands of people report online harms everyday. Failure to use this service responsibly by submitting false or vexatious abuse reports may result in losing privileges to use the NetBeacon Reporter service, and limit your ability to report to domain registries and registrars in the future.

 

Both policies are open and available within the NetBeacon Reporter app. Please view the Privacy Policy and Terms of Service.