Hats Network | LogoHats Network
Legal

Report Abuse

Report abusive activity on Hats Network Inc. infrastructure. Guidelines for submitting abuse reports.

How to Report Abuse

If you have discovered abusive activity involving Hats Network Inc. infrastructure, please report it to our Security Team:

Our Security Team will investigate your report accordingly. Please note that we may not be able to provide specific updates regarding your report(s) due to privacy reasons.

Required Information

To expedite investigation, your abuse report must include:

Source IP address(es)

The IP address(es) originating the abusive activity.

Destination IP address(es)

The IP address(es) being targeted or receiving the abuse.

Destination port(s)

Specific port(s) involved in the abusive activity.

Exact date/time stamp and timezone

Precise timing of the activity (e.g., 2026-03-24 15:30:45 UTC).

Important Notice

Incomplete reports may not be processed. If your abuse report does not contain enough information to identify the source of the abuse, we may not follow up with you regarding your report(s).

Important Notice

Blacklisted Report Sources

Abuse reports from the following sources will be automatically ignored due to history of false reports:

SourceStatus
bitninja.infoBlacklisted
myipr.com.cnBlacklisted
aldimna.comBlacklisted

Ignored Email Domains

Note

When submitting an abuse report, please use your work email address whenever possible to ensure that the report is properly investigated.

Reports from these email domains will not be processed:

DomainStatus
@tsinghua.edu.orgIgnored
@163.com / @126.comGray-listed
@qq.comGray-listed
@sina.comGray-listed
@mail.ruGray-listed

What Constitutes Abuse?

Reportable abusive activities include:

  • DDoS Attacks - Distributed Denial of Service attacks
  • Malware Distribution - Hosting or spreading malicious software
  • Phishing - Unauthorized attempts to collect sensitive information
  • Network Scanning - Unauthorized port scans or vulnerability assessments
  • Spam - Unsolicited bulk communications
  • Copyright Infringement - Unauthorized use of intellectual property
  • Illegal Content - Hosting of illegal material
  • Intrusion Attempts - Unauthorized access to systems

Security Best Practices

When reporting abuse:

  1. Include Evidence - Packet captures, logs, or screenshots when possible
  2. Be Specific - Provide exact timestamps and port information
  3. One Report Per Issue - Submit separate reports for different incidents
  4. Follow Up - Reference your original email if sending additional information

Investigation Timeline

Report TypeProcessing TimeNotes
Standard Email24-48 hoursReviewed during business hours (UTC)
Urgent Cases4 hoursCritical infrastructure threats only

All reports are treated confidentially. Do not publicly disclose that you have reported abuse to Hats Network Inc., as this may compromise the investigation.


Thank you for helping keep our network secure and abuse-free.

On this page