Petri Helenius wrote:


Maybe there is a lesson to be learned from many RBL operators. To make sure, just send packets to the whole /24 or /16 you got an "attack" packet from.

Which RBL operators flood /24's or /16's? What do they flood them with?

--
Requiescas in pace o email




Reply via email to