[ SDF Public Access UNIX System .. Est. 1987 ]

join welcome faq status members projects store tour gopher abuse dialup dsl minecraft social
tilde nihongo europa webmail gallery usermap teach irc tutorials software telnet ssh

The following are locally rejected hosts that continously violate SMTP protocol by using bogus senders and/or recipients. (These are the connect attempts we've denied for the previous day)

182.156.238.17 Static-17.238.156.182.tataidc.co.in. 143 190.16.222.43 43-222-16-190.fibertel.com.ar. 66 123.19.170.135 3(NXDOMAIN) 18 79.177.10.237 bzq-79-177-10-237.red.bezeqint.net. 8 83.219.192.164 mx2.bredband2.com. 8 95.134.174.36 36-174-134-95.pool.ukrtel.net. 8 24.100.125.116 3(NXDOMAIN) 7 24.105.210.193 24-105-210-193.cm.mhcable.com. 7 59.93.0.76 3(NXDOMAIN) 7 68.57.251.163 c-68-57-251-163.hsd1.in.comcast.net. 7 95.70.104.230 3(NXDOMAIN) 7 119.123.142.155 3(NXDOMAIN) 6 124.121.240.103 ppp-124-121-240-103.revip2.asianet.co.th. 6 141.146.5.11 acsebinet201.oracleeblast.com. 6 207.160.27.1 3(NXDOMAIN) 6 77.76.160.242 3(NXDOMAIN) 6
The following are attempts from publically listed open relays on ordb.org, spamhaus.org and spamcop.net. If you're here, don't contact us to get off. We do not determine who is in the ORDB. (These are the connect attempts we've denied for the previous day)




©1987-2065 SDF Public Access UNIX System, Inc. 501(c)(7)
(this page was generated using ksh, sed and awk)