Logo

Reporting Network Abuse

KairoHost LLC strictly prohibits the use of our infrastructure for illegal activities, spam, phishing, malware distribution, or copyright infringement. We take abuse reports very seriously and maintain a dedicated Trust & Safety team to investigate all claims.

Types of Abuse We Investigate

Our Acceptable Use Policy (AUP) strictly forbids malicious activity. If you encounter any of the following activities originating from a KairoHost LLC IP address or domain, please report it immediately.

Actionable Abuse Categories

We investigate reports falling into these primary categories.

Phishing & Fraud

Websites designed to look like banks, services, or brands in order to steal login credentials or financial information.

Malware & Botnets

Servers distributing viruses, ransomware, trojans, or acting as Command & Control (C2) servers for botnets.

Unsolicited Spam

Accounts sending bulk unsolicited email (spam) in violation of the CAN-SPAM Act, or domains used in spam email bodies.

Network Attacks

Servers participating in Distributed Denial of Service (DDoS) attacks, brute-force SSH attacks, or port scanning.

How to Submit an Abuse Report

To ensure our Trust & Safety team can act swiftly, your report must include specific technical evidence. Vague reports cannot be actioned.

Recommended workflow

  1. Verify the IP or Domain: Use a public WHOIS or IP lookup tool to confirm that the offending content is actually hosted on a KairoHost LLC IP address.
  2. Gather Evidence: For phishing/malware, copy the exact URL. For spam, export the full email headers (do not just forward the email body).
  3. Draft your report: clearly state the type of abuse, the offending IP/URL, and attach your evidence/logs.
  4. Send the report: Email your complete package directly to `abuse@kairohost.com`.

Notes and best practices

  • We process abuse reports 24/7/365. You will receive an automated ticket number upon submission.
  • Do not submit support tickets to the abuse department; they will be closed without a response.

DMCA Takedown Notices

If you believe your copyrighted material is being infringed upon by a website hosted on our network, you must submit a formal DMCA (Digital Millennium Copyright Act) takedown notice.

Required DMCA Information

A valid DMCA notice MUST include: A physical or electronic signature of the copyright owner, identification of the copyrighted work claimed to be infringed, identification of the material to be removed (exact URLs), your contact information, a statement of good faith belief, and a statement under penalty of perjury that the information is accurate.

Our Investigation Process

Transparency is important. Here is what happens after you submit a valid abuse report.

  • Initial Triage: Automated systems parse the report and extract the IP/Domain. The report is assigned to a Trust & Safety analyst.
  • Customer Notification: If the abuse appears to be the result of a compromised customer account (e.g., a hacked WordPress site), we notify the customer and give them 24 hours to clean the infection.
  • Immediate Suspension: If the account was specifically created to conduct fraud (e.g., a registered phishing domain), the account is suspended and null-routed immediately without warning.

Confidentiality

Due to privacy policies and ongoing investigations, we cannot provide you with updates regarding the internal actions taken against a customer's account. However, you will usually see the offending content removed within 24-48 hours of a verified report.