• Built by Engineers, Picked by Leaders
  • 24/7 support from real experts
  • 2,000+ TLDs live in seconds, not days
  • 100% Secure

Keeping the internet safe 24/7

Abuse Monitoring

Realtime Register has invested heavily in a system to monitor abusive domains, allowing us to quickly detect abuse, report on it, and recommend steps you can take. Together we make the internet safer. But above all, we prevent reputation damage for you and your customers, which could otherwise grow into major issues. Our monitoring tools continuously analyze domain activity to identify potential threats as early as possible. This proactive approach helps minimize risks and allows for faster response when abuse is detected. Use of the Realtime Register Abuse Monitoring & Reporting is FREE OF CHARGE for all domains registered or managed on our platform.

Key features
  • Extensive abuse sourcing 75+ blocklists and intelligence feeds and 120+ open thread exchange feeds.
  • Automated notifications Automated notifications for new abuse cases.
  • Extensive dashboard Dashboard with abuse percentage, abuse level, indicator type, abuse type, abuse feed, abuse per TLD and per brand.
  • Hourly updates Almost real-time threat intelligence is delivered through our API or email notifications. Providing the ability to process threat intelligence straight into your ticketing system.
  • ICANN RRA Spec. 11.3B compliancy Total DNS Abuse Overview on all levels. Detects spam, phishing, malware, botnets and pharming.
  • Zoom in functionality Zoom in per abuse case on number of feeds reporting the abuse and detailed information provided by the feed used.

1

Abuse Dashboard

75+

Intelligence Feeds

120+

Open Threat Exchange Feeds

2000+

Domain Extensions

Opportunities for your business

Domain Abuse is a big problem in our industry and occurs in many different ways: botnets, phishing, child pornography, malware, illegal pharmacies, CEO fraud, etc.

The responsibility for detecting and combating domain abuse is increasingly being shifted towards the registries, registrars, and the hosting provider. Yet completely preventing abuse is difficult, if not impossible. There will always be registrants who register a domain with (eventually) bad intentions. The trick is to recognize these registrants, monitor their actions, and intervene as quickly as possible when they develop illegal activities. If taken offline quick enough, they will stop or seek refuge elsewhere.

Abuse monitoring & reporting for a safer internet.

  • Show your customers and employees you take domain abuse very seriously
  • Abuse Insights unlocks unparalleled information for you and your customers to obtain insights into what types and abuse levels are ongoing in your domain portfolio
  • Abuse dashboard shows detected abuse and enables proactive action
  • Add users that should receive a notification when we detect an abuse case in your portfolio
  • Strong abuse prevention helps secure better promos and higher MDF funds
  • Please see the testimonials of GMO Registry and RADIX Registry below

Our partners in fighting DNS Abuse

Abuse Policy

Realtime Register is an active member of the internet community in the fight against abuse. We are among the initial signatories of the DNS Abuse Framework and follow the framework in our abuse policy regarding domain abuse. The framework applies to identify the following types of domain abuse.

  • Botnets
  • Phishing
  • Pharming
  • Spam
  • CSAM (Child Sexual Abuse Material)

Besides the DNS Abuse Framework, we are also proudly member of:

  • Global Cyber Alliance
  • topDNS Initiative
  • Cyber Threat Coalition
  • Covid-19 Cyber Threat Intelligence League
  • ECO/I2Coalition
  • Internet Infrastructure (I2) Coalition

URL/Hostname/content abuse is foremost the responsibility of the hosters (our customers) who are better positioned to battle these types of abuse. We assist our customers with resources, notifications, monitoring and consultancy. We also offer services where we act as first responders to abuse notifications on behalf of our customers, always within guidelines agreed upon with the customer.

Notice and takedown procedures

Most of these procedures are documented within the DNS Abuse Framework.

Realtime Register staff follows an incident reporting-based approach. If we receive a complaint, we determine the threat type and threat level. In our assessment, we investigate if more domain names are involved. After our staff has obtained all the available information, we apply the OODA loop. The OODA loop is a cyber intelligence strategy about the decision-making process. Broken down, the OODA loop stands for four distinct yet interrelated, smaller loops: observe, orient, decide, and act. Usually the result of this cyber intelligence approach is that we inform the customer to take down the malicious URL, or we inform the customer with the evidence why a domain name was taken down. These actions and processes are aligned with the relevant sections in our terms of service.

Key benefits:
  • Procedures documented in the DNS Abuse Framework
  • Incident reporting approach used for handling complaints
  • Staff assess threat type and severity of reported abuse
  • Investigation checks if multiple domains are involved
  • Uses the OODA loop decision-making model
  • Steps: observe, orient, decide, act
  • Customers usually asked to remove malicious URLs
  • Domains may be taken down with supporting evidence
  • Actions follow Realtime Register terms of service

Start with Abuse Monitoring today

Great! Are you interested in Abuse Monitoring? You can create your GO!ORANGE account to start straight away, without any hassle. Or just get in touch with us for more information.

Want to speak with us?

FAQ

For any further questions, don't hesitate to reach out to us.

What is Abuse Monitoring & Reporting, and is it free?

Abuse Monitoring & Reporting is a sophisticated system that continuously scans your domain portfolio for illegal or harmful activities such as phishing, malware, botnets, and spam. Realtime Register has invested heavily in this infrastructure to help you detect and mitigate threats early. Best of all, this service is provided free of charge for all domains registered and managed on our platform.

Where does the threat intelligence come from?

Our system aggregates data from over 75 professional intelligence feeds and more than 120 Open Threat Exchange feeds. We recently integrated predictive intelligence from the Global Cyber Alliance, allowing us to identify potentially risky domains based on behavioral patterns even before an actual abuse case is confirmed. This proactive approach helps reduce financial risks like credit card fraud and chargebacks.

How can I access and manage the abuse data?

You can access all findings through our Abuse Dashboard within the Insights platform. The dashboard provides a "zoom-in" functionality, allowing you to see which specific feeds reported a domain and the nature of the threat. Additionally, you can receive automated email notifications or pull near real-time intelligence directly into your own ticketing system via our API.

How does this service help me with compliance and reputation?

The service ensures you are fully compliant with ICANN RRA Spec. 11.3B, which requires registrars to monitor and take action against DNS abuse. By intervening quickly, you prevent your brand from being associated with cybercrime and avoid being blacklisted by major providers. Furthermore, demonstrating a proactive stance on abuse often helps resellers qualify for better promotions and higher Marketing Development Funds (MDFs) from registries.

What should I do when a domain in my portfolio is flagged for abuse?

Our system provides you with the evidence and recommendations needed to take action. Typically, this involves notifying your customer to remove malicious content or taking the domain offline if the activity is confirmed illegal. We act as a consultant and first responder, helping you navigate complex cases while following the DNS Abuse Framework to ensure the internet remains safe for everyone.