[ SDF Public Access UNIX System .. Est. 1987 ]

join welcome faq status members store tour gopher abuse dialup minecraft
social tilde europa webmail gallery usermap irc tutorials telnet git ssh

The following are locally rejected hosts that continously violate SMTP protocol by using bogus senders and/or recipients. (These are the connect attempts we've denied for the previous day)

182.156.238.17 Static-17.238.156.182.tataidc.co.in. 143 190.16.222.43 43-222-16-190.fibertel.com.ar. 66 123.19.170.135 3(NXDOMAIN) 18 79.177.10.237 bzq-79-177-10-237.red.bezeqint.net. 8 83.219.192.164 mx2.bredband2.com. 8 95.134.174.36 36-174-134-95.pool.ukrtel.net. 8 24.100.125.116 3(NXDOMAIN) 7 24.105.210.193 24-105-210-193.cm.mhcable.com. 7 59.93.0.76 3(NXDOMAIN) 7 68.57.251.163 c-68-57-251-163.hsd1.in.comcast.net. 7 95.70.104.230 3(NXDOMAIN) 7 119.123.142.155 3(NXDOMAIN) 6 124.121.240.103 ppp-124-121-240-103.revip2.asianet.co.th. 6 141.146.5.11 acsebinet201.oracleeblast.com. 6 207.160.27.1 3(NXDOMAIN) 6 77.76.160.242 3(NXDOMAIN) 6
The following are attempts from publically listed open relays on ordb.org, spamhaus.org and spamcop.net. If you're here, don't contact us to get off. We do not determine who is in the ORDB. (These are the connect attempts we've denied for the previous day)



27112 sess, 26382 (97.31%) passed, 0 (0.00%) blocked, 730 (2.69%) unknown

©1987-2065 SDF Public Access UNIX System, Inc. 501(c)(7)
(this page was generated using ksh, sed and awk)