TOR
We block TOR exit nodes so you can’t get anonymously attacked!
Hacked Hosts
We contact the people managing compromised hosts online
VPN Providers
Contacting VPN providers and anonymous proxy providers to shut down abusers of those services!
ISPs
We contact the ISPs who have compromised hosts. Most ISPs don’t have a decent security team and wait for a support issue to finally arise before even looking for a problem.
We see malicious hosts, find out who the ISP is and call them.