how can we help?

Please select from the list below. If you are looking for general contact info, please visit our contact page.

Certify

Phone: +1 800-458-4826 or +1 732-699-6703
Email: productsupport@iconectiv.com

Common Language

Phone: +1 877-699-5577
Email: clcsc@iconectiv.com
Website: commonlanguage.com

Finder

Phone: +1 866-834-5609
Email: findersupport@iconectiv.com
Website: finder.iconectiv.com

Gateway

Phone: +1 800-458-4826 or +1 732-699-6703
Email: productsupport@iconectiv.com

Intel

Phone: +1 844-295-7551
Email: IntelSupport@iconectiv.com
Website: intel.iconectiv.com

iTRS

Phone: +1 800-458-4826 or +1 732-699-6703 
Email: productsupport@iconectiv.com

Number Portability Administration Center (NPAC)

Phone: +1 844-820-8039
Email: lnpa-acct-mgmt@iconectiv.numberportability.com
Website: numberportability.com

Portability Clearinghouse

Phone: +1 800-458-4826 or +1 732-699-6703
Email: productsupport@iconectiv.com

Protect

Phone: +1 800-458-4826 or +1 732-699-6703
Email: protectsupport@iconectiv.com
Website: iconectiv.com/trunumber/protect

Routing

Phone: +1 800-458-4826 or +1 732-699-6703
Email: protectsupport@iconectiv.com
Website: iconectiv.com/trunumber/routing

Short Code Registry

Phone: +1 866-623-2272
Email: support@usshortcodes.com
Website: usshortcodes.com

SS7 Point Code

Phone: +1 800-458-4826 or +1 732-699-6703
Email: productsupport@iconectiv.com
Website: authenticate.iconectiv.com/

Telecom Routing Administration (TRA)

Phone: +1 866-672-6997
Email: tra@iconectiv.com
Website: iconectiv.com/truops/telecom-routing-administration

Toll-Free 8MS

Phone: +1 732-356-6999
Email: 8mscust@iconectiv.com

report security vulnerabilities

We take security seriously at iconectiv from the design, implementation, operation and management. If you are concerned about a potential security vulnerability please send email to security@iconectiv.com. Vulnerability information can be extremely sensitive. We will provide information for a secure way to transfer data.
 
It is important to include at least the following information in the email:

  • Contact name, and company if applicable 
  • Websites, and products and versions affected.
  • Describe potential vulnerability
  • Supporting technical details (such as system configuration, traces, description of exploit/attack code, sample packet capture, proof of concept, steps to reproduce the issue)