Hi,

Dňa 11. augusta 2024 15:20:50 UTC používateľ "Scott Q. via mailop" 
<mailop@mailop.org> napísal:
>I've noticed this maybe 3-4 years ago. Could not tie it to any
>legitimate customer or application.

Yes, not real users, IPs are mostly from US (hi COMCAST), but othervise
from ~60 countries, 219 ASNs... I am more aggressive, i block them
initially for 30 days and only small number of them repeats. Unfortunatelly,
i am able to identify them only after connection close (or at least i don't
know how to reliably do it sooner). I will check if exim allow me to set
(shorter) TLS handshake timeout.

>Didn't spend much time analyzing it, but I think it's some sort of bot
>trying to do some SSL shenaningans.

Yes, that is i what i am curious for, what they want to achieve, as these
numbers of attempts cannot hurt at all (~600 unique IPs in 120 days,
no more than two attempts per IP allowed in these days), even on spikes
no more than ~30 daily...

I consider/guess to be too unlikely, that here are many targets using plain
connection on 465 port to it be some random attack (the amount doesn't
look as targetted attack either), thus i guess some misconfiguration or
lack of knowledge (on author side), as these IPs doesn't try to connect to
587 nor 25 ports (with really small numbers of exceptions).

Anyway, thanks for all responses.

regards


-- 
Slavko
https://www.slavino.sk/
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to