if you're listed and think you shouldn't be, give me a call (you can't send me mail). and yes, these same thieves are also prevented from reaching the F.ROOT-SERVERS.NET host, but lack of reachability to one NS doesn't break their service. why in the world are we discussing this on NANOG? # general spam 204.141.123 masklen 24 interface lo0 reject; # Cybernex 208.1.117 masklen 24 interface lo0 reject; # Intgrtd Med. Promtns 208.8.32 masklen 24 interface lo0 reject; # Idea Concepts 207.76.82 masklen 24 interface lo0 reject; # hardchannel 206.222.107.192 masklen 29 interface lo0 reject; # telysis 207.86.199 masklen 24 interface lo0 reject; # onlinebiz / covesoft 207.217.56.116 masklen 32 interface lo0 reject; # mailloop.com 38.220.191 masklen 24 interface lo0 reject; # quantumcom 205.136.220.60 masklen 32 interface lo0 reject; # shadowgrp (IDCI) 204.183.199.231 masklen 32 interface lo0 reject; # xshadowx (uServe?) # softcell spam 199.250.187.72 masklen 32 interface lo0 reject; # www CNAME/A # cyberpromo spam 207.120.161.73 masklen 32 interface lo0 reject; # www.cpmall.com 207.124.161 masklen 24 interface lo0 reject; # NS8, NS9 (IDCI) 205.199.212 masklen 24 interface lo0 reject; # NS5 (AGIS) 208.5.0.0 masklen 20 interface lo0 reject; # NS10 (Crawford) 206.27.86.210 masklen 32 interface lo0 reject; # NS7 (ACUN)