Re: Most importantly, they implemented a SP side blacklist
Asterisk based security system apply lots more rules than that to detect hacking. For example, geographic location of the source IP address, rate at which calls are attempted, checking dialed numbers against a known fraudulent number database, etc. Carriers and ITSP's use something like SecData to monitor every call setup attempt. (same as SecAst integrated with an on-premise Asterisk PBX).