My deepest condolences :)
On Fri, 6 Jan 2023 18:29:05 +0100 Jaroslaw Rafa via mailop
wrote:
> Dnia 6.01.2023 o godz. 19:16:16 Mary via mailop pisze:
> >
> > Eventually I got tired of them and blocked all their AS networks from all
> > my clients. Spam and other malicious traffic dropped by
Dnia 6.01.2023 o godz. 19:16:16 Mary via mailop pisze:
>
> Eventually I got tired of them and blocked all their AS networks from all
> my clients. Spam and other malicious traffic dropped by 20% and not a
> single complaint about legitimate traffic being blocked.
Probably because I don't know an
I don't think they care to do that, probably because they make a lot of money
from said miscreants
One such bright example, is OVH. I've had the unpleasant experience dealing
with their imaginary "abuse" department.
Eventually I got tired of them and blocked all their AS networks from all my
For the record, this has been going on for some time...
You know it is a bullet proof hoster when...
You see those companies on RBL's really quickly. Surprised that many
well known hosters don't simply do a PTR walk on their own IP Space,
reveals quite quickly the miscreants. It's #NOTHATHARD
On Jan 5, 2023, at 14:54, Serizy via mailop wrote:
but what worries me is that, the PTR resolves to the fake hostname, but the
host name doesn’t resolve to the ip, logically…and the messages go to the user
mailbox in Outlook.com
This should not be an issue if the MTA performs both forward (A/A
Hello.
I would like to report here a spam source that is sending messages to some of
our users. Interestingly this source is using forged reverse names for their
ips, and they are using many different ips in what seems a snowshoe pattern.
The domains used for their reverse names, PTR records, a