Hey, Pete! Here's Steve Linford's posting about the most-recent Denial of Service against SpamHaus: http://groups.google.ch/group/news.admin.net-abuse.email/msg/28d49877cc8 dbc2d Meanwhile, the SARE and URIBL seem to be responsive now while suffering under the same campaign, but their websites aren't back yet. SURBL has changed their DNS to point to the loopback address, presumably to blunt the attack and turn them back on themselves. Given Steve Linford's comment, I was wondering if some spammer's network has been busy sending the SYN flood (and whatever else) at the expense of sending spam, as evinced by a hypothetical drop in fast-flux spam campaigns? Or is the opposite true? Does a massive DDoS against one or more antispam outfits act as cover while the bad guys try to send out new campaigns while "protected" from the listings of the antispammers? Andrew.