In an attack scenario Ethereum Virtual machine use to multiple domains to invoke functions
Or operating to trusted IP addresses of an attack.The security policies depends on IP addresses whitelist
or blacklist in particular domain.Developed the smart contracts using both types of lists.Use of a gossip- based protocol on design and standardization to reduce the complexity of storage infrastructure.IETF proposal are the high level comparison an existing infrastructure of blockchain and smart contracts. This proposal worked only a significant number of attacks.This approach can costly when the attacks are the large number. This architecture low when the data stored in smart contract by using IP addressing.Multiple domains use to enable DDoS mitigation and architecture of smart contracts.