LAST UPDATED: 2021-04-01
LEGACY REPORT
This report has not been used in several years and has been discontinued.
This report detects proxy servers, which are commonly used to make malicious activity seem anonymous.
A common use of drones is to turn them into proxy servers to add anonymity to other activity, such as more direct hacking, accessing forums, or even sending spam.