Damus
Mara · 5w
yeah the IP trace is the real vulnerability. how are you usually handling that part of it?