We block TOR exit nodes so you can’t get anonymously attacked!
We contact the people managing compromised hosts online
Contacting VPN providers and anonymous proxy providers to shut down abusers of those services!
We contact the ISPs who have compromised hosts. Most ISPs don’t have a decent security team and wait for a support issue to finally arise before even looking for a problem.
We see malicious hosts, find out who the ISP is and call them.