A virtual mailbox receives your mail, tosses the junk and scans the important pieces of mail ... but security systems will generally want your real address. Internet service providers don't just know ...
A coordinated IP spoofing attack that involved port scans tried to disrupt the Tor network by getting relays on blocklists.