Skip to content

Domain takedowns guide

Domain Takedowns help security teams and brand protection analysts request removal of malicious domains that impersonate a brand, distribute malware, or run phishing campaigns. The workflow compiles evidence, tracks progress, and coordinates with hosting providers and registrars.

Takedowns reduce impersonation risk and attack surface. Removing malicious domains limits how attackers can reach customers, employees, or partners through those hostnames.

  • Submit takedown requests: Request removal of malicious domains directly from lookup results
  • Track progress: Monitor takedown status through a five-stage workflow from submission to completion
  • View detailed evidence: Access comprehensive infrastructure data including DNS records, registration metadata, and geolocation
  • Filter and search: Organize requests by status, reason, domain name, or time range

Takedown request modal

Takedown requests can start from Lookup results or Alerts. When viewing suspicious domains, choose Takedown to open the request form.

  • Reason (required): Select the primary reason for the takedown:

    • Phishing: Site impersonates legitimate services to steal credentials
    • Trademark Infringement: Unauthorized use of registered trademarks
    • Malware Distribution: Site distributes malicious software
    • Identity Theft: Site attempts to steal personal information
    • Spam/Scam: Site promotes fraudulent schemes or spam
    • Other: Other security or legal concerns
  • Incident description (required): Provide specific evidence, similar domains, or an impact assessment (max 1000 characters)

  • Notification email (optional): Email address to receive status updates. If left blank, notifications go to the primary account email

The request form shows the five-stage takedown workflow:

  1. Report: Submit the request with domain and evidence
  2. Review: The team reviews the request and may request clarifications
  3. Evidence: Staff compile evidence required for the takedown (DNS records, registration data, screenshots)
  4. Takedown: Staff notify hosting and infrastructure providers and request removal
  5. Updates: Progress updates arrive by email as the takedown advances

After submission, a confirmation email arrives and the takedowns list tracks status.

Takedown details view

The detail view provides comprehensive information about each takedown request:

A screenshot of the target domain helps verify the malicious content and provides visual evidence for the takedown request.

A visual timeline shows the current stage of the takedown process, with highlighted steps indicating completed stages and the current active stage.

  • Reason: The selected takedown reason (Phishing, Trademark, etc.)
  • Description: The submitted incident description
  • Contact email: Email address receiving status updates
  • Tags: Public tags associated with the takedown (e.g., campaign identifiers, threat actor names)

Analyst notes and status change notifications appear chronologically, showing when the takedown moved between stages and any additional context provided by the team.

Comprehensive infrastructure data compiled automatically:

  • DNS A (IPv4): IPv4 addresses associated with the domain
  • DNS AAAA (IPv6): IPv6 addresses if present
  • DNS CNAME Records: Canonical name records
  • DNS NS Records: Nameservers responsible for the domain
  • DNS MX Records: Mail exchange servers
  • DNS TXT Records: Text records including SPF, DKIM, and other metadata
  • Timeline: Registration date, expiration date, and last changed date
  • Registrar Information: Registrar name, IANA ID, and abuse contact email
  • Technical Details: DNSSEC status, status codes, and DNS server names
  • IP Addresses: All IPs associated with the domain with ASN information
  • Geographic Map: Visual map showing the geographic distribution of infrastructure
  • ASN Details: Autonomous System Numbers and organization names
  • Alerts: Related alerts that triggered or are associated with this takedown
  • Takedowns: Other takedown requests for related domains or campaigns

Takedowns progress through five distinct stages:

  • Submitted: The request is received and queued for review
  • In Review: The team is evaluating the request and evidence
  • Gathering Evidence: Staff compile DNS records, registration metadata, and other supporting documentation
  • In Progress: Takedown notices have been sent to hosting providers and registrars
  • Completed: The takedown has been successfully processed (domain removed or access revoked)

Each status change triggers an email notification. Detailed status updates also appear on the takedown detail page.

  • Submit requests for domains that actively impersonate the monitored brand or services
  • Prioritize domains with recent registration dates and active infrastructure
  • Focus on domains classified as phishing, malware, or trademark infringement
  • Consider the domain’s threat level and potential impact on the organization
  • Monitor status updates in the detail view for analyst notes
  • Filter by status to focus on active takedowns (In Progress, Gathering Evidence)
  • Review completed takedowns to identify patterns or recurring threats
  • Use search to find specific domains across all takedown requests
  • Filter by reason to group similar threat types (e.g., all phishing requests)
  • Filter by status to prioritize follow-up on stalled requests
  • Link related takedowns to track coordinated campaigns

Takedown requests start from lookup results. When viewing suspicious domains, the Takedown button appears in the expanded row details. The request automatically includes the domain’s current DNS records, registration metadata, and screenshot.

Takedowns can link to alerts, creating a complete picture of threat detection and response. When an alert fires for a malicious domain, submit a takedown request and link it to the alert for tracking.

Use domain classification results (phishing, malware, and similar categories) to prioritize takedown requests. Domains classified as high-risk threats warrant immediate submission.