Hi Fred.

On 04/01/2026 10:18, Fred Morris via Postfix-users wrote:

I don't see how they can be more brain-damaged than they already are, they're already looping:

    2026-01-02T17:36:15.671360-08:00 flame postfix/smtpd[4447]: connect from 
scan.cypex.ai[3.137.73.221]
    2026-01-02T17:36:15.672050-08:00 flame postfix/smtpd[4447]: warning: 
non-SMTP command from scan.cypex.ai[3.137.73.221]: GET / HTTP/1.1
    2026-01-02T17:36:15.672419-08:00 flame postfix/smtpd[4447]: disconnect from 
scan.cypex.ai[3.137.73.221] unknown=0/1 commands=0/1
    2026-01-02T17:37:34.445451-08:00 flame postfix/smtpd[4447]: connect from 
scan.cypex.ai[3.137.73.221]
    2026-01-02T17:37:34.446043-08:00 flame postfix/smtpd[4447]: warning: 
non-SMTP command from scan.cypex.ai[3.137.73.221]: GET / HTTP/1.1
    2026-01-02T17:37:34.446334-08:00 flame postfix/smtpd[4447]: disconnect from 
scan.cypex.ai[3.137.73.221] unknown=0/1 commands=0/1

This client is sending non-SMTP commands, so setting "smtpd_delay_reject = no" will make no difference. i.e. It would only make a difference if the client was sending HELO/EHLO, MAIL FROM, RCPT TO, etc.

On 04/01/2026 10:38, Wietse Venema via Postfix-users wrote:
Another idea: use a logfile watcher and block the IP address
with a temporary TCP rule.

I agree that the only way to get rid of this type of traffic is with firewall rules, e.g. Fail2Ban?

Nick.
_______________________________________________
Postfix-users mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to