Honeypots are essential for securitypeople because they give you the opportunity to receive malware or spambots before or at the same time normal websites do and the security firms still have to write (or add) protection against it. But honeypots cost money so this initiative wants you to give them parts of servers or emaildomains. To get the latest attackers and scammers. If you participate you get access to their instantly updated database of IP adresses of hosts that were caught. It is just some lines of code to include or a small script to include in your servers. The results can be made public or kept private.
It would be smart for Vlaanderen.be to participate as they know will receive a lot of bad traffic at their mailserver because of the incident (once caught, always tried again). It would be interesting for many Belgian sites to participate and hope that by publishing this list we not only get better protected, but also will activate the so-called e-cops at doing something about it.
These are Belgian hosts that try to harvest emailaddresses. You have the Ip address, the number of incidents with the first and the last date.
These are Belgian hosts that try to test if emailaddresses work at emailservers (Directory attacks)
These are Belgian IP's that send spam and were identified as such and sent out most of the spam caught the last month
I think any big network operator should need it owns network of honeypots and this is a simple, coordinated and free way to do it.