We have designed and deployed numerous solutions to monitor gateways, ISP nodes, cybercafés and the likes. We have developed solutions to scan malicious and interesting traffic over protocols like VOIP, FTP, HTTP and platforms like emails, chats etc. Even in cases where anonymity solutions (Tor, VPN, proxies) are used, traffic is traced to the first node, and node is matched to our database of anonymity service providers. Tagging of specific IP's and analysis and pattern finding is carried on to gather further statistics.