Ok I finally got it logged! Although this instance happened after a netsplit rejoined, it didn't happen in prior times.

[11:12] -> mesra.kl.my.dal.net PRIVMSG moet :FLOODCHECK
[11:12] <- :mesra.kl.my.dal.net 301 moet moet :testing something ..
[11:12] <- :moet!zebra@218-101-96-20.dialup.clear.net.nz PRIVMSG moet :FLOODCHECK

I do, however, an on join /whois of most nicks to check for bad channels and real name fields of regular spam bots. Maybe this is what is causing this to happen? Is there any way to lessen the flooding?

I wonder if it was possible to put in a /whois server .. something similiar along the lines of the ctcp finger server, so it helps minimize the flooding and be able to select which channel(s) to use it on.


~ @#FunFactory / @#WorldChat ~ on DALnet ~