>> I see it too. I also use greyscanner to catch spammers and I see
>> a lot of spam to <random numbers and letters>@mydomains. So I trap
>> all hosts sending to addresses with numbers in them (as I don't
>> have any legit accounts with numbers). This catches almost all spam.

I finally got to deploying greyscanner on my mailservers,
and did something similar: trap every recipient address
with two or more digits in the user part (one digit could
be a typo, say a '2' before the '@'). This catches most of it.

>> I make all the ficticious addresses into spam traps.
>> Here's a bit of the output from my spamd database:
>> SPAMTRAP|a3d2...@witworx.com
>> SPAMTRAP|a7c85e...@witworx.com
>> ...

I do the same, but it seems less relevant now. In the past,
when I published a trap address, the bots harvested it and
tried to send to it, getting themselves trapped; but now
they just shoot out to wh4t3v3rg4rb...@mydomain.org,
apparently generating the user part themselves (as
opposed to harvesting real/trap addresses somewhere).

> I clean out the traps every few days with a script and back they come
> with new tries.

Yes. Recently, the 64.18.0.0 farm has been active on me.

$ spamdb | grep TRAPPED  
TRAPPED|86.122.194.113|1356282022
TRAPPED|212.110.189.85|1356283885
TRAPPED|216.106.48.217|1356289572
TRAPPED|64.18.0.21|1356308593
TRAPPED|171.76.91.71|1356281598
TRAPPED|64.18.0.140|1356286482
TRAPPED|217.200.184.87|1356290678
TRAPPED|64.18.0.23|1356304740
TRAPPED|64.18.0.142|1356285089
TRAPPED|194.228.32.128|1356286433
TRAPPED|64.18.0.25|1356298962
TRAPPED|64.18.3.31|1356302574
TRAPPED|64.18.0.177|1356322196
TRAPPED|91.121.102.20|1356281598
TRAPPED|178.236.112.75|1356281598
TRAPPED|64.18.0.187|1356301851
TRAPPED|64.18.0.144|1356295832
TRAPPED|67.228.3.116|1356298119
TRAPPED|64.18.0.27|1356310158
TRAPPED|64.18.0.181|1356286964
TRAPPED|217.72.102.116|1356281598
TRAPPED|64.20.227.133|1356282002
TRAPPED|64.18.0.146|1356305342
TRAPPED|64.18.0.183|1356294508
TRAPPED|213.174.32.135|1356281598
TRAPPED|89.189.37.102|1356286482
TRAPPED|64.18.0.148|1356290415
TRAPPED|64.18.0.247|1356293785
TRAPPED|64.18.0.185|1356286052
TRAPPED|74.125.149.196|1356287445

_All_ of the 64.18.0.0 hosts are trying dd02...@stare.cz
for two days now ...


> @GOOD = (
>         qr'^[A-Za-z\.\+]+@mydomain.(com|se)$'i,
> );
> $COMPREHENSIVE = 1; 

I was trying this too, until a customer made a typo,
blocking his company's smtp server.


On Nov 05 22:36:30, s...@spacehopper.org wrote:
> On 2012-11-01, Jan Stary <h...@stare.cz> wrote:
> > Anyway, it seems (some) spambots got less demented and actually do
> > resend, getting themselves whitelisted - thus working themselves
> > around the whole premise of greylisting.
> 
> Not the whole premise... A good part of it is to just delay the mail,
> this increases the chance that spamtraps etc will have picked up the
> mail before you accept it, thus increasing the effectiveness of other
> checks (DNSBL, razor/pyzor, etc).

True. Greyscanner has helped me very much!

        Jan

Reply via email to