NoonHost Special Deals! Save 75% on all Shared Hosting Plans & Locations
Have an account? Sign in now.
New to NoonHost? Create an account to get started today.
Copyright © 2021, NoonHost Operating Company, LLC. All Rights Reserved. The NoonHost word mark is a registered trademark of NoonHost Operating Company,
If you want to report an Internet breach to Noonhost, select an option below to create your report. Please provide the necessary details so that our team can investigate your complaint.If you have submitted a report by e-mail and have been forwarded to this form, your details areincomplete. In order for us to process your request, you must complete the form below and provide all the necessary information.
DMCA—is a federal law that helps copyright holders.
By submiting this form, you attest, under penalty of perjury, that (1) you have a good faith belief that use of the material in this report is not authorized by the copyright owner, its agent, or the law; (2) you are the copyright owner or authorized to act on behalf of the copyright owner; and (3) you understand, under 17 U.S.C. § 512(f), that you may be liable for any damages, including costs and attorneys fees, if you knowingly materially misrepresent that the material you are reporting is infringing.
Trademark abuse is the unauthorized use of a trademark in connection with services in a way that is likely to cause confusion about the source of the goods or services.
By entering your name, you affirm all information is true and accurate.All information submitted to us may be relayed to the customer during our remediation process.
Spam is Unsolicited Bulk Email distributed to recipients who have not provided direct consent.
Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
Malware is software that is intended to damage or disable computers and computer systems.
A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
Intrusion/exploit attempts (Bruteforce, Scans etc) attacks are when malicious applications makes several attempts to access, crack, or locate vulnerabilities on machines they have no right accessing. This is a technique commonly employed by malicious actors in order to find an attack vector to utilize against a server/website.
Child Abuse is physical maltreatment or sexual molestation of a child.
Violent threats and harassment are any sort of content pertaining to intent to harm a person(s). These can be threats of physical altercation or content to cause emotional distress.
Please utilize this form to provide Noonhost with evidence of any abuse outside of our categories listed.
Success!, your request has been successfully sent!, we will reply to you soon.
Sorry!, it seems to be a server problem right now!, please try again later.