Ive made a Double NAT, the public router facing the noise is connected to a VM ware env mimicing the ops sys. I wanted to get time and occupie the offencers. Until my Python Flask " on an encrypted USB encrypted into the router. Which also maintain Suricatas logs. And protecting it. While my flask is magnifying Suricata l, it also tries to locate the offenders location. That way we wont be idle defensive, Block log and forget, but a pro active defensive. We can actually commence a precautionary attack to incapacetate their albility to commence any other attack soon. A simple DDos attack would do. Flooding their networks with requests. Not damaging but crippling enough.