Return to Article Details The geographical distribution of the potential threat based on the collected blocked IP addresses from file hosts.deny Download Download PDF