Bad online behavior doesn’t start on social media; it starts with the internet connection behind the bad actor. Every Terms of Use agreement for every single ISP, VPN, and hosting provider prohibits harassment, nefarious behavior, and attempts to otherwise intimidate or terrorize others online.
And yet, thousands of survivors spend years begging police and courts to take the events seriously when the real pressure points sit with the companies providing the digital pipeline.
Consider this your Clutch Justice Guide to reporting abuse directly to the providers who have the power to shut down bad actors fast.
Why ISP Abuse Reporting Works (Even When Police Don’t)
ISPs and VPN providers are required under federal law and their own internal policies to respond to credible reports of:
- Abuse/Maltreatment
- Threats
- Targeted surveillance
- Unauthorized access attempts
- Digital impersonation
- Mobbing
Unlike police, who usually do not understand cyber patterns, IP logs, or digital escalation, ISPs have entire abuse teams dedicated to shutting down malicious activity before their network becomes a liability.
When you file abuse reports with documentation, you force:
- Internal investigations
- Temporary or permanent account suspension
- Disabling abusive accounts
- Forwarding incidents to law enforcement if necessary
- Cutting off the digital access the harasser needs to keep targeting you
This is how you cut their power at the source.
Where to Send Abuse Reports (With Links & Emails)
Below is the direct abuse-reporting list you requested—formatted for survivors, families, and advocates to copy, paste, and use immediately.
AceVPN
Submit screenshots + harassment documentation:
https://www.acevpn.com/acevpn/images/acevpnsupport.png
Amazon AWS VPN
Report abuse here
AT&T
Email all evidence to: abuse@att.net
Comcast / Xfinity
Email screenshots, dates, and IP information to: abuse@comcast.net
ExpressVPN
support@expressvpn.zendesk.com.
Gmail
Go to this link and complete the form.
GoDaddy
Email screenshots, dates, and IP information to: abuse@godaddy.com
HostGator
Visit their page here.
NordVPN:
Send all documentation support@nordvpn.com
Proton VPN / DataCamp
Send all documentation to: abuse@proton.me
Verizon
Submit evidence and timestamps to: abuse@verizon.com
What to Include in Every Abuse Report
Your report must be clear, structured, and evidence-based. Use this template section-by-section:
1. A brief description of the harassment
Explain what happened, how often, and in what pattern.
Example:
“This user is engaging in (description here) through digital accounts in violation of your Terms of Service.”
2. Time and date stamps
ISPs match logs based on timing down to the minute.
3. Screenshots or exported messages
Include:
- Messages
- Profiles
- IP logs
- Threats
- Attempts to evade blocks
- Use of multiple accounts (mob swarms)
4. URLs of incidents or social accounts used for malicious intent
5. Your request
Be explicit:
“Please investigate this activity, suspend the abusive user, and forward logs to law enforcement if needed.”
You are not asking; you are documenting a network violation.
Mob-Style Harassment: Why This Matters
Trolls, Manipulators, Extremists are part of a broader ecosystem of digital abusers who use:
- VPNs
- Throwaway accounts
- Alternate profiles
- Automated scripts
- Coordinated swarms AKA mobbing
- Proxy abuse and/or harassment
- Third-party amplifiers
But they still depend on one thing: an Internet Service Provider. When you report the network, you shrink the playground.
Survivors Deserve Digital Protection—Not Digital Terror
If police minimize your experience, if systems laugh off cyberstalking, if friends tell you to “just ignore it”—remember:
The internet is traceable.
Their IP addresses are traceable.
Their digital footprints are traceable.
And the companies providing that access have zero tolerance for users who weaponize their networks; these people are liabilities waiting to happen.
Send your reports.
Document everything.
And shut them down, one ISP at a time.


