From all emails sent only in 2 cases they really needed to have it open. But even som they were conscious about the problem and they even tightened the number of queries per minute they allow.
All the remaining cases, simply didn't know about the problem and where looking for malware/virus on their servers.
US-CERT as some nice info about this and how to fix it:
http://www.us-cert.gov/ncas/alerts/TA13-088A
Cheers,
khaos
...
As as a person who offers DDOS protection services and deals with a ton of these false positives every day, I know a thing or two about this.
As a person who offers DDOS protection services, you have a vested interest in not seeing actions like this having much effect. It's called a Conflict of Interest.
People need to understand the value of receiving third party email regarding problems on their network. I've been an admin for years, and some of the most effective tools for identifying servers that have been, to some degree, compromised are third-party notifications.
/Salute to KhaOS and Serraz for trying to do something positive, and then spreading it to the community.
You are missing the point, you are sending emails to a source that has either sent nothing at all or is an open recursive DNS server MOST of the time.