Check out my 'hnbl' at
http://web.they.org/software/mailfun/

hnbl stats from my current log file (top 10 hits listed):

count    %    regex
-----   ----  -----
85      1.9%  ^h-\d{1,3}-\d{1,3}-\d{1,3}-\d{1,3}\.[a-z0-9]+\.covad\.net$
126     2.8%  ^h\d{1,3}-\d{1,3}-\d{1,3}-\d{1,3}...\.shawcable\.net$
135     3.0%  .*\.dyn\.optonline\.net$
148     3.3%  ^ac[0-9a-f]{6}\.ipt\.aol\.com$
160     3.5%  .*\d{1,3}-\d{1,3}-\d{1,3}-\d{1,3}.*\.rr\.com$
174     3.8%  .*\.client2\.attbi\.com$
205     4.5%  
^adsl-\d{1,3}-\d{1,3}-\d{1,3}-\d{1,3}\.dsl\.[a-z0-9]{4,8}\.(pac|sw)bell\.net$
246     5.4%  ^pcp\d+pcs\..*\.comcast\.net$
371     8.2%  .*dip\.t-dialin\.net$
399     8.8%  .*\.client\.comcast\.net$
4521    Total
2004-01-14 23:40:53.917574500
2004-01-19 16:30:05.112430500


I love watching the hits come in waves from ISPs around the globe. Its
almost intersting to see just how wide-spread the spam-trojan infection
is.

-Frank


On Tue, 20 Jan 2004, Peter J. Holzer wrote:

# Is there a plugin which matches client hostnames
# ($qp->connection->remote_host) against a regexp to block them?
#
# Given that lots of spam sources are hosted at comcast and other
# providers with easily identifyable naming schemes that might be useful.
# It's easy to write but I'd like to avoid reinventing the wheel.
#
#       hp
#
#

-- 
Nobody snuggles with Max Power.  You strap yourself in and feel the "G"s!

Reply via email to