1. Select the location you wish to investigate
2. Click ‘analytics’, then ‘connections’
3.Select your desired time range by pressing date picker(we’d recommend selecting as long a range as possible to spot the abusers)
4. When you found the abusive user click their email.
5. Click ‘Block this device’ to block them on the network