On Mon 21/Oct/2024 17:46:14 +0200 Geoff Mulligan via mailop wrote:
Maybe I'm just now more observant, but I've seen a huge increase in bunches of systems trying to brute force an SASL login.
Here is a list of IPs that have tried in just the last hour:
[...]
87.120.84.58
[...]

I wrote a script to check my mail log and block the IPs.
What do you all do?


Maybe not all the IPs you listed are miscreants. Some might be weak hosts infested by bots. The one I quoted, for example, is not tagged as 100% abusive by AbuseIPDB.

Is it worth to send a complaint to their ISP? In some cases, I found people unaware of how bots did use their IP, unable to find the reported TCP connection in their firewall's log. Either they eventually close their hole or the ISP closes their contract, for good ISPs that is.

Besides complaining, I block them slightly, because they could be legitimate users trying to log in from an unusual IP. Blocking hardens on each bad password but decreases as time passes.


Best
Ale
--




_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to