TOR

We block TOR exit nodes so you can’t get anonymously attacked!

Hacked Hosts

We contact the people managing compromised hosts online

VPN Providers

Contacting VPN providers and anonymous proxy providers to shut down abusers of those services!

ISPs

We contact the ISPs who have compromised hosts.  Most ISPs don’t have a decent security team and wait for a support issue to finally arise before even looking for a problem.

We see malicious hosts, find out who the ISP is and call them.