IP Abuse Contact Database

Overview

Our IP Abuse Contact Database gives you instant access to the correct abuse desk for any routable IP that connecting you to verified addresses, phone numbers, and emails worldwide. By mapping IPs to the responsible operator (ISPs, cloud providers, hosting networks, and enterprises) and their preferred reporting channels, it streamlines abuse escalation, speeds up takedowns, and helps you quickly pinpoint the source of malicious or unwanted activity to keep your environment safer.

Updated daily and delivered in flexible formats (CSV, JSON, MMDB, or custom exports/API), each record includes organization and netblock context, primary abuse mailbox and phone. Below, you'll find full documentation of the archive contents, schema definitions, file specifications, and integration notes to help you integrate with SIEM/SOAR, ticketing, and security workflows—fast.

Available Database Formats

CSV
CSVCSV
File Size: 323.75 MB
Entries: 32.2M
Fields: 9
Last Updated: Yesterday
MMDB
MMDBMMDB
File Size: 757.96 MB
Entries: 32.2M
Fields: 9
Last Updated: Today
Important
If you require our IP to Abuse Contact Database in a different format, such as Parquet or any custom structure, please feel free to reach out to us via our contact form. We are happy to accommodate specific format requests to meet your needs.

CSV Database Documentation

1.Overview

The CSV version is a set of Gzip-compressed CSV files containing IP ranges and their Abuse Contact details. Designed for bulk imports and integration into relational databases.

2.Archive Content

After downloading and extracting the IP to Abuse Contact CSV database archive, you’ll find the following files (with their types noted):

db-abuse-details.csv.gz
db-abuse-details.csv.gzdb-abuse-details.csv.gz

Gzip-compressed CSV provides abuse contact info: unique ID, network, and contact details.

File Size: 110.96 MB
Entries: 44.3M
Fields: 8
db-ip-abuse.csv.gz
db-ip-abuse.csv.gzdb-ip-abuse.csv.gz

Each start_ip, end_ip link to the abuse details ID that is related to the abuse-details file.

File Size: 212.78 MB
Entries: 32.2M
Fields: 3
README.md
README.mdREADME.md

Documentation for dataset contents, schema, usage, and support.

File Size: 4.55 KB
checksum.txt
checksum.txtchecksum.txt

SHA-256 checksums for verifying file integrity.

File Size: 251 Bytes
Tip

Always verify downloaded files with the provided checksum before importing.

On Linux, if sha256sum is not installed, first run:

sudo apt-get install coreutils

Then check the archive files against the checksum file with:

sha256sum -c checksum.txt

Example output:

db-abuse-details.csv.gz: OK
db-ip-abuse.csv.gz: OK
README.md: OK

If a file’s checksum does not match, FAILED will be shown instead of OK . If verification fails, first confirm that the download completed correctly; if the issue persists, please contact our support team.

Schema

This section describes the schema of each file included in the IP to Abuse Contact Database archive. For every file, you’ll find its purpose, field definitions, and examples to help with integration.

1.db-ip-abuse.csv.gz

This file contains IP address ranges linked to abuse details. It maps each IP block to a unique abuse_details_id , which in turn corresponds to the abuse contact information.

FieldTypeDescriptionCan be empty?Example
start_ipstringThe starting IP address of the range in IPv4 or IPv6 format.No192.168.0.1
end_ipstringThe ending IP address of the range in IPv4 or IPv6 format.No192.168.0.255
idnumberThe unique identifier for the abuse contact.No1
Tip
abuse_details_id joins to db-abuse-details.id to get abuse contact information for IP.

Example Records

Loading code block…

2.db-abuse-details.csv.gz

This file provides detailed abuse contact information. It links a unique ID to a specific network, country, and other contact details, including name, address, emails, and phone numbers.

FieldTypeDescriptionCan be empty?Example
idnumberThe unique identifier for the abuse contact.No1
networkstringThe network associated with the abuse contact.Yes192.168.1.0/24
countrystringThe ISO 3166-1 alpha-2 code of the country associated with the abuse contact.YesUS
kindstringThe kind specifies whether the contact is a person or an organization.Yesgroup
nameobjectThe name (english) of the abuse contact.YesAbuse Team
addressstringThe physical address of the abuse contact.Yes1600 Amphitheatre Parkway, Mountain View, CA 94043, USA
emailsstringComma-separated email addresses associated with the abuse contact.Yesabuse@example.com
phone_numbersstringComma-separated phone numbers associated with the abuse contact.Yes+1-800-555-0199
Tip
id in the db-abuse-details.csv.gz file joins to the abuse_details_id field in db-ip-abuse.csv.gz

Example Records

Loading code block…

3.File Relationship Diagram

The diagram below illustrates the relationships between the various files included in the CSV database package. It shows how the main CSV file connects to reference table for abuse contact details, ensuring accurate data linkage and integrity.

Schema Diagram
Click to expand

File Format & Encoding

All IP to Abuse Contact CSV datasets are provided in UTF-8 encoding, comma-separated, and compressed with Gzip (.csv.gz). Each file includes a header row listing the field names for clarity and consistency.

Field values are unquoted by default, with quotes applied only in the following cases:

  • Line breaks within text fields.
  • Commas inside a value (e.g., addresses).
  • Lists of values (e.g., languages).
  • Spaces that may be auto-quoted by export tools.

MMDB Database Documentation

1.Overview

MMDB version of the database consists of three files: one MMDB file containing all the abuse contact data, a README file, and a checksum file, all compressed together in a ZIP file for easy delivery.

2.Archive Content

After downloading and extracting the IP to Abuse Contact MMDB database archive, you’ll find the following files (with their types noted):

db-ip-abuse.mmdb
db-ip-abuse.mmdbdb-ip-abuse.mmdb

Provides full abuse contact details for IP addresses: network, country, kind, and contact info.

File Size: 757.95 MB
Entries: 32.2M
README.md
README.mdREADME.md

Documentation for dataset contents, schema, usage, and support.

File Size: 4.55 KB
checksum.txt
checksum.txtchecksum.txt

SHA-256 checksums for verifying file integrity.

File Size: 159 Bytes
Tip

Always verify downloaded files with the provided checksum before importing.

On Linux, if sha256sum is not installed, first run:

sudo apt-get install coreutils

Then check the archive files against the checksum file with:

sha256sum -c checksum.txt

Example output:

db-ip-abuse.mmdb: OK
README.md: OK

If a file’s checksum does not match, FAILED will be shown instead of OK . If verification fails, first confirm that the download completed correctly; if the issue persists, please contact our support team.

Response Schema

This section describes the structure of the data returned from the IP to Abuse Contact MMDB file. Each field is detailed with its type, meaning, and example values to help you interpret responses and integrate them into your applications.

1.db-ip-abuse.mmdb

This file contains abuse contact details for both IPv4 and IPv6 address ranges. Below is an example of the structure you will encounter in the response.

2.Field Reference

The following reference lists all fields available in the MMDB response. Each entry includes the field path, its description, data type, and example value to help you understand how to parse and integrate the data.

Showing 0 of 7
Select a field to view details

Example Records

Loading code block…

Data Format & Constraints

  • All fields defined in the schema are always present in the IP to Abuse Contact MMDB response.
  • Fields may contain empty strings (""), but never null, so null checks are not required.
  • Place names such as countries, states, districts, and cities are available in multiple translations.
  • All text values are encoded in UTF-8.
  • Field names and response structure remain stable across updates for backward compatibility.

Database Updates & Delivery

When you subscribe to our IP to Abuse Contact database, we’ll send you static download links for the archive in your chosen formats. These links never change, so you can use them both for your initial download and for all future updates.

Our databases are refreshed daily and weekly, ensuring you always have access to the most current data. Each time your subscribed dataset is updated, you’ll also receive an email notification so you don’t miss a release.

For automated workflows, you can check our status endpoint to see the last update timestamp. When the date changes, simply re-fetch the archive using your static download URL to pull the latest version into your system.

Subscribe Our Newsletter

Get the latest in geolocation tech, straight to your inbox.