if you're listed and think you shouldn't be, give me a call (you can't send
me mail). and yes, these same thieves are also prevented from reaching the
F.ROOT-SERVERS.NET host, but lack of reachability to one NS doesn't break
their service.
why in the world are we discussing this on NANOG?
# general spam
204.141.123 masklen 24 interface lo0 reject; # Cybernex
208.1.117 masklen 24 interface lo0 reject; # Intgrtd Med. Promtns
208.8.32 masklen 24 interface lo0 reject; # Idea Concepts
207.76.82 masklen 24 interface lo0 reject; # hardchannel
206.222.107.192 masklen 29 interface lo0 reject; # telysis
207.86.199 masklen 24 interface lo0 reject; # onlinebiz / covesoft
207.217.56.116 masklen 32 interface lo0 reject; # mailloop.com
38.220.191 masklen 24 interface lo0 reject; # quantumcom
205.136.220.60 masklen 32 interface lo0 reject; # shadowgrp (IDCI)
204.183.199.231 masklen 32 interface lo0 reject; # xshadowx (uServe?)
# softcell spam
199.250.187.72 masklen 32 interface lo0 reject; # www CNAME/A
# cyberpromo spam
207.120.161.73 masklen 32 interface lo0 reject; # www.cpmall.com
207.124.161 masklen 24 interface lo0 reject; # NS8, NS9 (IDCI)
205.199.212 masklen 24 interface lo0 reject; # NS5 (AGIS)
208.5.0.0 masklen 20 interface lo0 reject; # NS10 (Crawford)
206.27.86.210 masklen 32 interface lo0 reject; # NS7 (ACUN)