It has been reported on Twitter by many and gloated over by the anonymous dweebs opposing this work. No further notice has been seen yet. This is likely a cartooney that Dr Beall is taking very seriously – we hope the interruption is temporary only. In the meantime, the Internet Archive has snapshots of the site before the recent events, most recently from Dec 30, 2016.
We wish Dr Beall all the best and for the service to be restored as soon as possible.
Thank you to everybody querying the list.
We don’t know who you are. We have no way to find out, and no wish to, either. It is enough that it is happening. We’ll let the figures speak for themselves, and we thank you all for your support.
We’ll just let this one speak for itself.
This is really just a pointer to a blog article published elsewhere on the topic of an annoying Swiss spammer apparently based in Latin America.
Attention all cPanel users.
These posts are about ten years old, yet we still keep receiving boxtrapper spam.
We list it as spam. False accusations about forged sender addresses having sent spam are the only type of spam we list that isn’t Scientific Spam proper. This software (these types of software, including Spam Arrest, misconfigured amavisd-new, etc.) should simply not exist at all.
Endurance (webhostbox.net) did the right thing and suspended the domain names and all services for a variety of Annex Publishers domain names and websites so that IP addresses that had sent Annex Publishers spam could be delisted.
See attached letter.
Letter from Marcus Evans to Scientific Spam, 21 June 2016
This post will be edited with responses to the points presented.
Something must have changed over at MX Toolbox as they have started reporting it to people who are using their services that we list the IPs that are being monitored. The listings in question are of any age, from over two years old to very recent.
We’ve reported TargetMol to Benchmark Email several times on Twitter and in email ever since we first listed them two weeks ago. We haven’t received a response.
$ check targetmol.com
targetmol.com A 127.0.1.2 TXT "[TARGETMOL] Do you know TargetMol? -Yes, you are spammers, we know you now. [email protected] 20160420"