These tools were created for network providers to quickly and efficiently manage larger networks including bulk removals after termination of end user service violations and network abuse.
Open a research request on a spam incident. In some cases an admin may need help tracking down the source of a spam outbreak. We can pull logs to help identify the source.