Website setup
Icon
Themes
Light
Dark
Features
Desktop View
Hide Hot Deals Popups
Quick Links
Copyright

Report abuse and illegal content

If you want to report an Internet breach to Wilbernight, select an option below to create your report. Please provide the necessary details so that our team can investigate your complaint.
If you have submitted a report by e-mail and have been forwarded to this form, your details are
incomplete. In order for us to process your request, you must complete the form below and provide all the necessary information.

DMCA Takedown

DMCA—is a federal law that helps copyright holders.

By submiting this form, you attest, under penalty of perjury, that (1) you have a good faith belief that use of the material in this report is not authorized by the copyright owner, its agent, or the law; (2) you are the copyright owner or authorized to act on behalf of the copyright owner; and (3) you understand, under 17 U.S.C. § 512(f), that you may be liable for any damages, including costs and attorneys fees, if you knowingly materially misrepresent that the material you are reporting is infringing.

Trademark Infringement

Trademark abuse is the unauthorized use of a trademark in connection with services in a way that is likely to cause confusion about the source of the goods or services.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Spam

Spam is Unsolicited Bulk Email distributed to recipients who have not provided direct consent.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Phishing

Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Malware

Malware is software that is intended to damage or disable computers and computer systems.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Botnet

A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Intrusion/exploit attempts (Bruteforce, Scans etc)

Intrusion/exploit attempts (Bruteforce, Scans etc) attacks are when malicious applications makes several attempts to access, crack, or locate vulnerabilities on machines they have no right accessing. This is a technique commonly employed by malicious actors in order to find an attack vector to utilize against a server/website.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Child Abuse

Child Abuse is physical maltreatment or sexual molestation of a child.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Violent Threats and Harassment

Violent threats and harassment are any sort of content pertaining to intent to harm a person(s). These can be threats of physical altercation or content to cause emotional distress.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Other

Please utilize this form to provide Wilbernight with evidence of any abuse outside of our categories listed.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Xerox

Success!, your request has been successfully sent!, we will reply to you soon.

Xerox

Sorry!, it seems to be a server problem right now!, please try again later.

Your privacy matters

We use cookies to provide our services and for analytics and marketing. To find out more about our use of cookies, please see our Privacy Policy and Cookie and Tracking Notice. By continuing to browse our website, you agree to our use of cookies.
Settings

//