Threat analysts and researchers sharing practical guidance on phishing response, digital risk monitoring, and incident workflows.
Reporting a malicious website is one of the most effective ways to speed up phishing takedowns and reduce user risk.
However, the quality of your report directly affects how quickly action is taken. Clear, structured evidence makes reports easier to validate, faster to triage, and more likely to result in removal.
This guide provides a step-by-step checklist you can use to report phishing websites, brand impersonation, and other malicious content.
Reviewers need to quickly confirm that a page is malicious and take action.
A high-quality report reduces ambiguity and speeds up decision-making.
Include:
The clearer your report, the faster it can be processed.
Capture the full URL(s), including any paths that lead to credential capture.
If multiple pages are involved, record each one.
Avoid interacting with the page—treat it as evidence.
Collect:
If the page redirects, document the full path and destination.
Focus on control points that can remove or disable the content:
If you want a central starting point, begin via report.
Structure your report so it is easy to review:
This reduces back-and-forth and speeds up validation.
After submitting:
Then verify whether the page has been removed.
Reporting is only the first step. Attackers often return with new domains or updated infrastructure.
To reduce repeat exposure:
If you need help coordinating across teams, use contact.
If the page is requesting credentials or impersonating your organisation, report it with supporting evidence. It is better to act early than delay.
Only include what is necessary to validate the threat. Do not enter credentials or expose unnecessary information.
Check the exact URLs you reported and confirm that credential capture pages are no longer accessible. Monitor for replacements or new variants.
Effective reporting is critical, but coordinating takedowns across multiple platforms can be complex.
Our takedown service helps structure reporting, accelerate removal, and monitor for reappearance.