Report Abuse
Saw something suspicious?
If you’ve received a phishing email, found a fake account claiming to be Averrow, or spotted a lookalike domain — send it to us. We triage every report and take action on every confirmed abuse case.
Phishing Email
Suspicious message claiming to be from Averrow, your bank, or any
other brand. Forward it as an attachment so we get the full
headers.
- Forward as attachment (preserves headers & SPF/DKIM)
- Or paste the full source if forwarding isn’t possible
- Don’t click links or open attachments first
Brand Impersonation
Fake social account, lookalike domain, or website pretending to
be a brand. Include as much identifying info as you can.
- Full URL or social handle (e.g. @brandname_support)
- Screenshots of the impersonating profile or site
- The brand being impersonated
Counterfeit or Fraud
Counterfeit storefronts, fake invoices, fraud schemes using a
brand’s name. Same intake as impersonation — we
route internally.
- URL of the counterfeit listing or storefront
- Invoice or message text if you have it
- Brand affected and any payment instructions sent to you
What Happens Next
Every report goes through the same three steps.
Fully automated. You’ll get an acknowledgment within seconds and a determination within an hour.
Step 01
Instant acknowledgment
Within seconds you receive an email confirming we got your submission, with a tracking reference for any follow-up.
Step 02
Deep inspection
The Averrow platform extracts indicators (URLs, sender headers, sending IP, payload signatures), classifies the message, and correlates it against our threat-intel feeds. Typically completes within the hour.
Step 03
Determination email
You receive a follow-up with our verdict — malicious content discovered, or we believe it’s safe — plus confidence and any action we’ve taken (IOCs into platform intel, takedown evidence, partner signal).
We don’t share your details.
Your email address and any personal information in the body stay
internal to Averrow’s analyst team. Indicators (URLs, domains,
sender IPs, file hashes) may be shared with platform partners and
threat-intel feeds to help with takedowns.