Skip to content

Takedown Requests

The Takedown Requests view tracks the status of requests to remove malicious content targeting your organization. When ShadowMap identifies phishing sites, fake applications, domain squatting, or other brand abuse, you can submit takedown requests and track their progress through resolution.

Overview

Takedown Requests

The page displays takedown requests as expandable accordion cards. Each card shows the takedown title, current status badge, and originating module. Cards can be expanded to reveal full details and a timeline view of the takedown's progress. A search bar and module filter allow narrowing the list.

Takedown Statuses

StatusDescription
RequestedThe takedown has been submitted and is pending action by the hosting provider or registrar
In ProgressThe hosting provider or registrar is processing the takedown request
CompletedThe malicious content has been successfully removed
FailedThe takedown request was not successful -- the content remains online

Takedown Card Details

Expanding a takedown card reveals:

FieldDescription
Module Record IDLink to the original finding that triggered the takedown request
TitleDescription of the malicious content being taken down
Contact NameThe customer or team member who submitted the request
Module NameWhich ShadowMap module the finding originated from
ReasonThe stated reason for the takedown request
PriorityPriority level of the takedown (styled by severity)

Takedown Timeline

Each takedown includes a visual timeline showing the progression through statuses with timestamps. This provides a clear audit trail of when the request was submitted, when the provider began processing, and when resolution occurred (or failed).

Submitting a Takedown

Takedown requests can be initiated from several ShadowMap modules:

ModuleWhat Gets Taken Down
Phishing & ImpersonationsPhishing sites impersonating your brand, login pages, or web properties
Fake ApplicationsCounterfeit mobile apps on Google Play Store or Apple App Store
Domain SquattingDomains registered to exploit your brand name
Social MediaFake social media accounts impersonating your organization

To submit a takedown:

  1. Navigate to the relevant finding in one of the modules above
  2. Click the Request Takedown action on the finding
  3. Fill in the takedown details (reason, priority, contact information)
  4. Submit the request
  5. Track progress from this Takedown Requests page

Filtering

FilterDescription
SearchFree-text search across takedown titles and details
ModuleFilter by originating module to see only phishing takedowns, fake app takedowns, etc.
  1. Submit takedowns promptly for confirmed malicious content -- delays increase user exposure
  2. Monitor In Progress status -- follow up with providers if requests stall
  3. Verify Completed takedowns -- confirm the malicious content is actually removed, not just redirected
  4. Re-submit Failed takedowns with additional evidence or through alternative channels
  5. Track resolution times to identify responsive and unresponsive hosting providers
  6. Document everything using the timeline for compliance and legal evidence

ShadowMap by Security Brigade