By using AWS re:Post, you agree to the Terms of Use

Abuse phishing report


I got an email with this title and Description but i don't know how to fix it? is anyone can help me?

Sep 08, 10:50 AM UTC We've received a report(s) that your AWS resource(s) listed in the 'Affected resources' tab has been implicated in hosting content that resembles a phishing website. Hosting a phishing website is forbidden in the AWS Acceptable Use Policy ( We've included the original report below for your review.

Please take action to stop the reported activity. You would have also received an email notification from with this same report. Please reply directly to that email with details of the corrective actions you have taken. If you do not consider the activity described in these reports to be abusive, please reply to that email with details of your use case.

If you're unaware of this activity, it's possible that your environment has been compromised by an external attacker, or a vulnerability is allowing your machine to be used in a way that it was not intended.

We are unable to assist you with troubleshooting or technical inquiries. However, for guidance on securing your instance, we recommend reviewing the following resources:

If you require further assistance with this matter, you can take advantage of our developer forums:

Or, if you are subscribed to a Premium Support package, you may reach out for one-on-one assistance here:

Please remember that you are responsible for ensuring that your instances and all applications are properly secured. If you require any further information to assist you in identifying or rectifying this issue, please let us know in a direct reply to the email you received from


1 Answer


The email should have outlined which AWS resources have been identified to be hosting a phishing site. You may not be aware, but that resource may have been compromised and is now being used to phish other users. It's recommended to follow the instructions and either remove the malicious phishing site or take down the individual resources (EC2 instances, etc.).

Per the email, if you need additional information or support from the AWS abuse team, please reach out to

profile picture
answered a month ago
profile picture
reviewed a month ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions