Might want to make a note of location, IP and email used by this person. They may try and come back using a Tor or mask the IP. Depends how mush this is automated by them...
No comments:
Post a Comment