Just what I was looking for. I tried to search google for that list, but didn't find it.
Yes, I have shell access as I run a few dedicated servers. I'll just stick to adding it to the 'do not block' exemption list
Thanks for the quick reply!
Quote:
Originally Posted by calorie
Here are all the *.rr.com domains. Either remove them from the 0-9, a-z spamlist files or place them on the do not block exemption list.
Code:
@austin.rr.com
@bak.rr.com
@bham.rr.com
@bizwoh.rr.com
@ca.rr.com
@carolina.rr.com
@cfl.rr.com
@cinci.rr.com
@columbus.rr.com
@elp.rr.com
@gt.rr.com
@hawaii.rr.com
@houston.rr.com
@hvc.rr.com
@insight.rr.com
@jam.rr.com
@kc.rr.com
@maine.rr.com
@midsouth.rr.com
@mn.rr.com
@nc.rr.com
@neb.rr.com
@neo.rr.com
@nj.rr.com
@nyc.rr.com
@nycap.rr.com
@rgv.rr.com
@rochester.rr.com
@san.rr.com
@satx.rr.com
@sc.rr.com
@socal.rr.com
@sw.rr.com
@swfla.rr.com
@tampabay.rr.com
@triad.rr.com
@twcny.rr.com
@wi.rr.com
@woh.rr.com
I'm not sure whether or not I'll add a wildcard option, but if you have shell access, you can search for domains by using the following commands:
Code:
# this finds all domains where .domain.com is present
grep [.]domain[.]com spamlist_*.txt | more
# this finds all domains ending in domain.com
grep domain[.]com$ spamlist_*.txt | more
# this finds all domains starting with @domain.
grep ^@domain[.] spamlist_*.txt | more
Alternatively, you could use your PC to search the spamlist directory, at least to find the spamlist files containing the domain pattern of interest.
|