Petri Helenius wrote: > Maybe there is a lesson to be learned from many RBL operators. To make > sure, just send packets to the whole /24 or /16 you got an "attack" > packet from. Which RBL operators flood /24's or /16's? What do they flood them with? -- Requiescas in pace o email