Cloudflare Abuse Contact
Hank Nussbacher
hank at interall.co.il
Sat Jan 8 16:04:12 UTC 2022
On 07/01/2022 21:35, Töma Gavrichenkov wrote:
I would try noc at cloudflare.com based on:
https://www.peeringdb.com/net/4224
Regards,
Hank
> Peace,
>
> On Fri, Jan 7, 2022 at 8:42 PM Mike Hale <eyeronic.design at gmail.com> wrote:
>> The abuse email sends an auto-responder that tells you to use the web form.
>> The web form is centered around their web hosting business; I figured
>> I'd try general, but you can't submit it without punching in a URL
>> that is hosted by Cloudflare (and they validate it ... you can't do
>> https://bogus.site).
>>
>> What I'm seeing is a ton of abusive DNS traffic that's causing some
>> issues, and there's no abuse form that works for this scenario.
>
> Most probably, that means that the company doesn't have any counter
> abuse process whatsoever for requests like yours, so no matter where
> you push that, there won't be any action.
>
> Having said that, the aforementioned form accepts "https[: slash
> slash]cloudflare.com" as a valid URL so chances are requests to that
> URL are treated in the general sense.
>
> In the meantime, are you sure you'll be able to support your case with
> data? DNS is *mostly* a connection-less protocol, so how do you know
> these queries are coming from Cloudflare and not from a spoofed
> source?
>
> Lastly, have you tried to block the problematic Cloudflare IP range to
> see what would happen? E.g. does 1.1.1.1 still resolve your domains
> then, etc.?
>
> --
> Töma
More information about the NANOG
mailing list