Focusing on top security is one of our aims. Like any labs we need to index threats and have very updated list of them. the best source for make a list of threats are victims. Attacks report automatically from our nodes or manualy submited by trusted users.
Any user of Deny List can (voluntary) set his system to report attacks. Next step happens in Deny List core system, by synced all list together and affected result to our IP Risk database.