by malcolmhum » Wed Mar 01, 2017 5:11 pm
Hi
Thanks for the response.
In the logs, you can see instances of the system doing a denial, but they are persistently trying. Below are examples from the SMTP log.
If the files could be searched for certain failed actions then applied automatically to the block lists. If you found that an IP had been blocked that you did not want blocking then you could add it to the white list and then it would be auto removed from the block. You could have either a common master list or by service.
Both examples are very common. The login ones they are not tripping the anti hammering anymore as they are maybe trying a login from different ip's every 10 minutes or so and just rotating around until they get lucky.
Wed, 01 Mar 2017 14:08:18 -> 182.75.243.62 -> Success: Action=[Accept Connection], Details=[Port 25]
Wed, 01 Mar 2017 14:08:18 -> 182.75.243.62 -> Success: Action=[Received Hello], Details=[Host=nsg-static-62.243.75.182-airtel.com]
Wed, 01 Mar 2017 14:08:18 -> 182.75.243.62 -> Success: Action=[Received Sender], Details=[abdi@ganindo.com]
Wed, 01 Mar 2017 14:08:19 -> 182.75.243.62 -> Failed: Action=[Received Recipient], Details=[colm@vmsecure.co.uk: Relaying not permitted.]
Wed, 01 Mar 2017 14:08:19 -> 182.75.243.62 -> Success: Action=[Close Connection]
Wed, 01 Mar 2017 14:42:36 -> 5.237.147.185 -> Success: Action=[Close Connection]
Wed, 01 Mar 2017 14:42:36 -> 5.237.147.185 -> Success: Action=[Accept Connection], Details=[Port 25]
Wed, 01 Mar 2017 14:42:36 -> 5.237.147.185 -> Success: Action=[Received Hello], Details=[Host=[192.168.1.2]]
Wed, 01 Mar 2017 14:42:36 -> 5.237.147.185 -> Success: Action=[Starting Login], Details=[LOGIN authentication.]
Wed, 01 Mar 2017 14:42:37 -> 5.237.147.185 -> Failed: Action=[Login], Details=[ace]
Wed, 01 Mar 2017 14:42:42 -> 5.237.147.185 -> Success: Action=[Close Connection