Report Abuse

Guidelines for reporting abusive activity on our infrastructure.

Effective Date: April 14, 2026

Thank you for helping keep the global routing table and Sunyz Network secure and abuse-free.

Introduction

Sunyz Network (AS150289) strictly prohibits the use of our infrastructure for malicious, illegal, or abusive activities. As a network operator committed to global routing security and unwavering reliability, we take all reports of abuse seriously and investigate them promptly.

This document outlines how to properly report abusive activity originating from or targeting our network, including spam, DDoS attacks, unauthorized access, and violations of our Acceptable Use Policy (AUP).

How to Report Abuse

If you have discovered abusive activity involving Sunyz Network infrastructure, please report it directly to our Security and Abuse Response Team.

Our Security Team will investigate your report accordingly. Please note that we may not be able to provide specific operational updates regarding your report due to privacy reasons and internal security policies.

Required Information

To expedite the investigation, your abuse report must include the following technical details. Incomplete reports or reports lacking actionable evidence will not be processed.

  1. Source IP Address(es): The IP address(es) (IPv4 or IPv6) originating the abusive activity.
  2. Destination IP Address(es): The IP address(es) being targeted or receiving the abuse.
  3. Destination Port(s): Specific port(s) involved in the abusive activity.
  4. Exact Timestamp & Timezone: Precise timing of the activity (e.g., 2026-04-14 15:30:45 UTC).

Security Best Practices for Reporting

  • Include Evidence: Always attach raw plain-text logs, packet captures, or relevant screenshots. Do not send logs as PDF or Word documents.
  • Be Specific: Provide exact metrics and indicators of compromise (IoCs).
  • One Report Per Issue: Submit separate emails for entirely different incidents to help our ticket system categorize them correctly.

What Constitutes Abuse?

Reportable abusive activities include, but are not limited to:

  • DDoS Attacks: Distributed Denial of Service attacks or traffic amplification.
  • Malware Distribution: Hosting or spreading malicious software, command and control (C2) servers.
  • Phishing: Unauthorized attempts to collect sensitive information.
  • Network Scanning: Unauthorized port scans, brute-force attacks, or vulnerability assessments.
  • Spam: Unsolicited bulk communications or CAN-SPAM violations.
  • Copyright Infringement: Unauthorized hosting or distribution of copyrighted material (DMCA notices).
  • Intrusion Attempts: Unauthorized access to systems or routing infrastructure.

Investigation Timeline

Report TypeEstimated Processing TimeNotes
Standard Reports24 - 48 hoursReviewed during standard business hours
Urgent / Critical< 4 hoursReserved for critical infrastructure threats and massive DDoS only.

All reports are treated confidentially. We ask that you do not publicly disclose ongoing investigations, as this may tip off the malicious actors and compromise our mitigation efforts.

Important Notice on Report Sources

To ensure our NOC team is not overwhelmed by false positives, automated scrapers, or low-quality automated reports, Sunyz Network filters incoming abuse emails.

Ignored & Gray-listed Email Domains

When submitting an abuse report, please use your corporate/work email address associated with your network (ASN) or organization whenever possible.

Reports from the following public email providers face strict filtering:

DomainStatus
Contains tsinghuaIgnored
@163.com / @126.comGray-listed
@qq.comGray-listed

Search

Search for a command to run...