Skip to main content
Cette page est intentionnellement présentée en anglais.

Report Abuse

Linode requires any party (“Affiant”) acting on behalf of another person or entity (“Represented Party”) to submit the affidavit of representation (“Affidavit”) detailed below. You must provide all required information prior to submitting any requests on behalf of a Represented Party.

If Applicable

If you’re reporting on behalf of an entity, please enter the information below. Otherwise, leave this section blank.

File name:

File size:

If you’re reporting on behalf of an entity, please enter the information below. Otherwise, leave this section blank.

Botnet Activity generally occurs when a Linode is observed connecting to a domain or IP address that has previously been identified as part of a botnet’s server infrastructure. This report can also include discovery of C&C servers.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

Brute force is used to describe unauthorized attempts to gain access to a system, typically in numerous attempts. This type of activity typically occurs over SSH, website login, SMTP server login, etc.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

Malicious activity typically consists of scans such as port scans, service scans, website directory scans, etc. This category can also include SQL injections, SMB injections, plugin exploits, user enumeration, and others.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

We act expeditiously in response to CSAM complaints.

We suggest reporting any CSAM to the National Center for Missing and Exploited Children (“NCMEC”) in addition to reporting it with us.

All information submitted in this report will be submitted to the US National Center for Missing & Exploited Children.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation. Please note that we will not share your personal information when passing on your report for this type of abuse.

Copyright infringement is the use or production of copyright-protected material without the permission of the copyright holder.

The Digital Millennium Copyright Act (DMCA) requires that takedown notices fulfill six specific elements of notification as indicated below. Reports submitted without all of these required elements will not be processed. Please note that consistent with Linode’s legal obligations, all submitted reports will be FORWARDED TO THE END USER IN QUESTION, including reporter identity and contact information.

1) Identify the copyrighted work(s) in question. Depending on the nature of your complaint, links to your original work may be helpful.

2) Identify the infringing material that should be removed, as well as all relevant information needed for Linode to locate it.

3) Provide Linode sufficient contact information to reach you regarding your complaint. Your address, telephone, and e-mail address are all acceptable.

4) Provide a statement that you, in good faith, believe that the use of this material in the manner mentioned in this complaint is not authorized by the copyright owner, their agent, or by the law.

5) Provide a statement that the information you’ve provided in this notification is accurate and under penalty of perjury that you are the owner, or are authorized to act on behalf of the owner regarding exclusive use rights that are allegedly being infringed.

6) A physical or electronic signature of the copyright owner or the person authorized to act on their behalf.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

Malicious Content refers to hosted content that is meant to infect or harm visitors.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

When a service or port is open to a public, it can create an opportunity for a vulnerability to be exploited. Some examples of possibly vulnerable open services are DNS resolvers, SMB, Redis, Portmapper, LDAP, etc.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

Phishing websites usually impersonate popular services or banking institutions in an attempt to steal credentials, credit card information, and other personal information. These often have input fields on the page for victims to enter their information.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

Spam is unsolicited bulk messages, usually sent via email. This report type can also be used for phishing spam.
Here is a guide for finding the headers needed for submitting a report to us. You can use this tool to determine if this spam email came from Linode.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

Trademark infringement is a violation of the rights attached to a trademark without the authorization of the trademark owner or any licensees.

Please note that consistent with Linode’s legal obligations, all submitted reports will be FORWARDED TO THE END USER IN QUESTION, including reporter identity and contact information.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation.

Violent Threats and Harassment

These reports are utilized in cases that there are imminent threats to one’s safety. Please be as specific as possible when submitting your request. For example, if it’s occurring at a website, please provide us with the specific link and cite the specific content in question. If an activity is occurring on a separate platform, please let us know how you were able to determine that the activity originated from Linode. In addition to filing this report with us, we suggest contacting law enforcement if there is a direct threat to someone’s safety.

Our Acceptable Use Policy can be found here.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation. Please note that we will not share your personal information when passing on your report for this type of abuse.

Other Acceptable Use Policy Violation

These are activities that you believe violate our Acceptable Use Policy in some capacity. Please be specific in outlining what section of our policy you believe this violates as well as providing us with links leading directly to the material that you are reporting.

All information submitted in this report may be supplied by Linode to the applicable customer(s) during the course of our investigation. Please note that we will not share your personal information when passing on your report for this type of abuse.

Identify the copyrighted work(s) in question. This is a link directly to the original material that is being infringed upon.

Identify the trademarked work(s) in question. This is a link directly to the original material that is being infringed upon.

This is the name of the agency or organization where the trademark is officially registered.

This is the name of the agency or organization where the copyright is officially registered.

Provide up to 25 IP addresses, one per line. If an IP address is obfuscated behind a service (e.g. Cloudflare), please reference the obfuscated IP address. If multiple IP addresses are reported, the entirety of the logs provided will be sent to the owners of all of the IP addresses referenced.

Please provide us with a link to the phishing website which clearly shows the phishing activity.

Place plaintext logs of the activity, including timestamps, source IP address, and target IP/domain (if applicable).

Please provide us with a direct link to the malicious content. If you have determined that the Linode is hosting malicious content outside of a website (such as serving content over a specific port), please provide us with information on how you have determined and verified that malicious content is present.

Include the full headers of the email.

Issued by the USPTO, WIPO, or other similar intellectual property registry. This will allow us to look up the registration status of this trademark and other important information for our investigation.

Issued by the USPTO, WIPO, or other similar intellectual property registry. This will allow us to look up the registration status of this copyright and other important information for our investigation.

Upload Trademark Office proof of ownership. If you are not the trademark holder, then you will need to submit an affidavit of representation or letter of authorization to us with your complaint to show us that you are an authorized representative.

1

File name:

File size:

Upload proof of ownership. If you are not the copyright holder, then you will need to submit an affidavit of representation or letter of authorization to us with your complaint to show us that you are an authorized representative.

1

File name:

File size:

Identify the infringing material that should be removed, as well as all relevant information needed for Linode to locate it.

Identify the copyrighted work(s) in question. Depending on the nature of your complaint, links to your original work may be helpful.

Identify the trademarked work(s) in question. Depending on the nature of your complaint, links or documents showing the trademark itself may be helpful.

By typing your name, you are adding an electronic signature to the form. To electronically sign this form, type your name below.