We also had a spammer using a compromised user account from this IP
and while surge does in fact support ipv6 notation most places and we
use those successfully, we have started using iptables for criminals
that do this.
The user account was compromised via an infected m$ pc. Gotta love Redmond.
On 11/05/2012 03:26 PM, VinnyHIDDEN@@Dell.com wrote:
> This is the first I've seen this so far from an IPv6 address. It's always the criminals that adopt new technology faster than the public. :)
> With this in mind, does Surgemail have the same limiters in place for IPv6 as IPv4 addresses for protection? I'm just thinking quickly out loud, but perhaps the block should be on a /64 basis since it would be trivial to keep jumping around inside the /64 to bypass limiters of a single /128 address.
> -----Original Message-----
> From: Mail System [mailtoHIDDEN@llurian.net]
> Sent: Monday, November 05, 2012 8:11 AM
> Subject: Spammer sending detected on 2607:f298:2:121::ef6:ef83 from multiple ip addresses (8), change users password urgently, or set g_breakin_whiteHIDDEN@tellurian.com or disable by setting to *, use tellmail breakin_release to unlock the account
> Important report from SurgeMail mail1.tellurian.net host=mail1 - see details below
> Spammer sending detected on 2607:f298:2:121::ef6:ef83 from multiple ip addresses (8), change users password urgently, or set g_breakin_white ******************* or disable by setting to *, use tellmail breakin_release to unlock the account
EAS Enterprises LLC
World Class Web and Email Hosting Solutions
IPv6 ready today for your needs of tomorrow!
Ask us about dual-stacking your site
Last Message | Next Message
Site Map |
Contact Netwin |
POP3 Mail Server |
Linux Webmail |
UnInstall instructions for all products
Copyright © 2017 Netwin Ltd. All rights reserved.