Abuse Center
URL.DIET is designed as a cloud infrastructure utility for simplifying URLs, not a cloaking or evasion tool. We take abuse seriously and will work with providers to disable malicious links and cooperate with investigations where appropriate.
What counts as abuse?
- Links used for phishing, credential theft, or social engineering.
- Links that distribute malware or exploit kits.
- Links used to coordinate DDoS, spam, or botnet activity.
- Links that clearly violate the policies of upstream platforms and networks.
Please include:
- The full URL.DIET edge link (for example:
https://url.diet/example). - A brief description of the suspected abuse.
- Any relevant headers, screenshots, or logs if you have them.
Reports can be sent to your normal abuse and security channels referencing this page and the link in question. Network operators and providers can reference our security.txt for a machine-readable policy location.
For each click, URL.DIET stores hashed IPs only, along with anonymized telemetry such as country, device family, and user agent fingerprints. Raw IP addresses are not retained in the analytics tables.
This telemetry allows us to detect patterns of abuse while minimizing the amount of directly identifiable information stored.
- Disable or re-route specific edge links that are clearly malicious.
- Rate-limit or block abusive traffic patterns at the edge.
- Cooperate with infrastructure and hosting providers when incidents are reported.