I suspect that AWS resources are being used for abusive or illegal purposes, and I want to report it to AWS.
Resolution
Primary report methods
The following methods are ways to report suspected abuse of AWS resources.
What to expect after a report
The AWS Trust & Safety team takes the following actions:
- Uses the information that you provide to investigate and try to resolve the incident that you reported.
- Requests additional information through your provided email address, if needed.
- Shares information only with prior permission from the party that controls the resource.
- Mediates between reporters and implicated customers as needed.
Special instructions
For multiple IP addresses:
- Submit a CSV file with the IP address, ISO date-time, and network log details.
For specific requests:
- Government authorities: For customer information requests, follow the Amazon Law Enforcement Guidelines. Trust & Safety accepts communications in English (preferred), or in French for the EU authorities.
- Amazon Simple Email Service (Amazon SES) spam/malicious emails: Report to email-abuse@amazon.com.
Important: AWS Support can't assist with abuse reports or questions about Trust & Safety notifications.
Types of abuse
The following are types of abuse reports that Trust & Safety handles:
- Objectionable web content or non-copyright intellectual property that's hosted on an AWS resource. The content might be a webpage, image, video, or some other form of internet content.
- Abusive email sent from an AWS resource or spam content hosted on, or sent from, an AWS resource.
- Network activity that originated from an AWS resource that causes problematic network traffic. This can include an intrusion attempt, Distributed Denial of Service (DDoS) attack, port scanning, or any other abusive network activity.
- Copyright that's subject to content removal requests regarding the Digital Millennium Copyright Act (DMCA).
When you submit a report, include the following information:
- For content abuse: Include the URL and description of the issue or available content.
- For activity abuse: Include the target IP address, timestamp with time zone, and log samples that show the activity.
- For DMCA: Provide a valid DMCA complaint that follows public documentation guidelines.
Related information
Contact AWS
How do I stop receiving email spam?