Report Abuse
Report abusive activity on Hats Network Inc. infrastructure. Guidelines for submitting abuse reports.
How to Report Abuse
If you have discovered abusive activity involving Hats Network Inc. infrastructure, please report it to our Security Team:
Our Security Team will investigate your report accordingly. Please note that we may not be able to provide specific updates regarding your report(s) due to privacy reasons.
Required Information
To expedite investigation, your abuse report must include:
The IP address(es) originating the abusive activity.
The IP address(es) being targeted or receiving the abuse.
Specific port(s) involved in the abusive activity.
Precise timing of the activity (e.g., 2026-03-24 15:30:45 UTC).
Important Notice
Incomplete reports may not be processed. If your abuse report does not contain enough information to identify the source of the abuse, we may not follow up with you regarding your report(s).
Important Notice
Blacklisted Report Sources
Abuse reports from the following sources will be automatically ignored due to history of false reports:
| Source | Status |
|---|---|
| bitninja.info | Blacklisted |
| myipr.com.cn | Blacklisted |
| aldimna.com | Blacklisted |
Ignored Email Domains
Note
When submitting an abuse report, please use your work email address whenever possible to ensure that the report is properly investigated.
Reports from these email domains will not be processed:
| Domain | Status |
|---|---|
| @tsinghua.edu.org | Ignored |
| @163.com / @126.com | Gray-listed |
| @qq.com | Gray-listed |
| @sina.com | Gray-listed |
| @mail.ru | Gray-listed |
What Constitutes Abuse?
Reportable abusive activities include:
- DDoS Attacks - Distributed Denial of Service attacks
- Malware Distribution - Hosting or spreading malicious software
- Phishing - Unauthorized attempts to collect sensitive information
- Network Scanning - Unauthorized port scans or vulnerability assessments
- Spam - Unsolicited bulk communications
- Copyright Infringement - Unauthorized use of intellectual property
- Illegal Content - Hosting of illegal material
- Intrusion Attempts - Unauthorized access to systems
Security Best Practices
When reporting abuse:
- Include Evidence - Packet captures, logs, or screenshots when possible
- Be Specific - Provide exact timestamps and port information
- One Report Per Issue - Submit separate reports for different incidents
- Follow Up - Reference your original email if sending additional information
Investigation Timeline
| Report Type | Processing Time | Notes |
|---|---|---|
| Standard Email | 24-48 hours | Reviewed during business hours (UTC) |
| Urgent Cases | 4 hours | Critical infrastructure threats only |
All reports are treated confidentially. Do not publicly disclose that you have reported abuse to Hats Network Inc., as this may compromise the investigation.
Thank you for helping keep our network secure and abuse-free.