Wandering Thoughts archives

2006-12-30

Weekly spam summary on December 30th, 2006

The SMTP frontend died twice late Friday night, to my irritation. That said, this week we:

  • got 9,806 messages from 186 different IP addresses.
  • handled 15,551 sessions from 916 different IP addresses.
  • received something over 204,995 connections from at least 58,611 different IP addresses.
  • hit a highwater of at least 6 connections being checked at once.

The message count is down dramatically from last week because this week is a vacation week for the university. The connection volume is not down at all because spammers don't really take vacations.

Kernel level packet filtering top ten:

Host/Mask           Packets   Bytes
213.4.149.12          10174    529K
71.16.74.210           7322    337K
193.252.22.158         6772    406K
213.29.7.0/24          5738    344K
210.92.140.22          4222    203K
217.12.180.25          3418    164K
196.25.78.162          2679    135K
213.4.149.66           2279    119K
212.43.241.13          2247    123K
203.97.33.64           2205    115K

This is somewhat quieter than last week, and centrum.cz's /24 continues to drop in the league tables.

  • 213.4.149.12, 193.252.22.158, and 212.43.241.13 return from last week.
  • 71.16.74.210 and 203.97.33.64 kept trying to send us stuff that had already tripped our spamtraps.
  • 210.92.140.22 and 196.25.78.162 had bad DNS.
  • 217.12.180.25 and 213.4.149.66 kept trying bad HELOs.

(The symmetry here is amusing but random.)

Connection time rejection stats:

  64823 total
  36173 dynamic IP
  22508 bad or no reverse DNS
   4600 class bl-cbl
    349 class bl-dsbl
    279 class bl-sdul
    202 'fairgamemail.us'
     83 class bl-njabl
     48 class bl-sbl
     38 class bl-spews
     36 cuttingedgemedia.com

Good old Cutting Edge Media. Too cutting edge to catch a clue, evidently. (Although it's more likely that they're merely uninterested in purging bouncing addresses from their mailing lists, because that would reduce their nominal value.)

What I have marked down in our records as 'fairgamemail.us' is 204.14.1.66 to 204.14.1.126, which is all part of SBL27197 (a /21 for '247 Surf Net' or cpchosting, listed since October 29th) and which, judging from the DNS names, may belong to something with the inviting name of 'optindirectmail'. (They've hit us in previous weeks; I don't always bother sorting through the explicitly blocked people to boil out a nice report.)

Only two out of the top 30 most rejected IP addresses were rejected 100 times or more this week; 124.240.124.166 (139 times) and 196.25.78.162 (121 times). 17 of the top 30 most rejected IP addresses are currently in the CBL, 5 are currently in bl.spamcop.net, and one of them is in the SBL; 209.205.236.225, which is part of SBL41018 and SBL49194 (the former is a /24 for a spammer, the latter is a /20 for pacnet.com.mx spammer hosting as an escalation listing, both dating from December 24th).

Pretty much as usual, 209.205.236.225 was not actually rejected for being on the SBL but for other stuff that we check first, in this case missing reverse DNS. Possibly I ought to promote the SBL and so on to somewhat earlier in the checking. The top actual SBL rejections were:

11 SBL38413 a /20 for ServerFlo, Inc (23 Nov 2006, although all our hits were in a /24 that is SBL37655, which was listed 12 Oct 2006)
10 SBL49248 Vietnamese webmail that is an advance fee fraud spam source (18 Dec 2006)
5 SBL49074 hijacked server sending spam (13 Dec 2006)

(Plus something that has since been removed from the SBL, so I'm not going to mention it.) |

This week, Hotmail managed:

  • 3 messages accepted, which I really suspect were all spam.
  • no messages rejected because they came from non-Hotmail email addresses.
  • 12 messages sent to our spamtraps.
  • no messages refused because their sender addresses had already hit our spamtraps.
  • 1 message refused due to its origin IP address being in the CBL.

Okay, maybe Hotmail's advance fee fraud spammers take small vacations.

And the final numbers:

what # this week (distinct IPs) # last week (distinct IPs)
Bad HELOs 594 87 1147 104
Bad bounces 72 60 117 98

There are no particularly outstanding sources of bad HELOs this week, nor any particularly clear locus of bad bounces the way there was last week. Random alphabetical usernames made up most of the bounce targets, with the leader being 'ijiefuurmcl' (five bounce attempts).

SpamSummary-2006-12-30 written at 23:51:03; Add Comment

2006-12-23

Weekly spam summary on December 23rd, 2006

The SMTP frontend died and was restarted at 2:24 am Wednesday morning, so some stats are only from then. That said, this week we:

  • got 14,896 messages from 260 different IP addresses.
  • handled 22,673 sessions from 1,353 different IP addresses.
  • received 147,470 connections from at least 47,766 different IP addresses since Wednesday at 2:24 am.
  • hit a highwater of 10 connections being checked at once since Wednesday at 2:24 am.

It looks like we'd received about 65,000 connections as of Tuesday morning, which would make the total volume roughly the same as last week. The per-day information is kind of broken, but since Wednesday morning we seem to have had higher traffic than usual, running between 35,000 and 40,000 connections a day.

Kernel level packet filtering top ten:

Host/Mask           Packets   Bytes
62.94.0.34            13437    605K
213.4.149.12          12301    640K
213.29.7.0/24          8888    533K
193.252.22.158         4936    296K
217.20.114.13          4783    287K
216.48.45.2            3515    164K
212.43.241.13          3478    191K
60.231.152.85          3241    165K
83.17.193.138          3045    183K
62.66.138.173          2939    149K

This is a change from last week, with totallyfreeld.net dropping out completely and a welcome drop in overall volume.

  • 62.94.0.34 and 216.48.45.2 had too many bad HELOs.
  • 213.4.149.12, 193.252.22.158, and 60.231.152.85 return from last week.
  • 217.20.114.13 is in the NJABL.
  • 212.43.241.13 is a fr.clara.net machine that kept on trying to send us stuff that had already tripped spamtraps.
  • 83.17.193.138 and 62.66.138.173 are dynamic IP 'dialup' machines.

Connection time rejection stats:

  52591 total
  31494 dynamic IP
  16375 bad or no reverse DNS
   3541 class bl-cbl
    312 class bl-sdul
    222 class bl-dsbl
     77 class bl-njabl
     44 class bl-sbl
     24 class bl-spews
     15 cuttingedgemedia.com
      8 class bl-ordb

This is, alas, the last week that the ORDB will appear in the stats, as the ORDB shut down December 18th (as reported on Slashdot, among other places; I am not linking to their website, because they're going to turn that off soon).

Only one out of the top 30 most rejected IP addresses was rejected 100 times or more this week: 63.138.101.141 (102 times, in the CBL). 16 of the top 30 are currently in the CBL and 7 are currently in bl.spamcop.net.

Almost half of the SBL rejections this week came from one IP, 202.175.95.171 aka SBL49074, apparently a hijacked spam sending machine. The next two, rejected five times each, are 66.158.163.165 (SBL49046) and 221.133.1.17 (SBL49248). In a sign that the universe is returning to the proper order of things, both are listed for being advance fee fraud spam sources.

This week, Hotmail had:

  • 1 message accepted.
  • no messages rejected because they came from non-Hotmail email addresses.
  • 28 messages sent to our spamtraps.
  • 3 messages refused because their sender addresses had already hit our spamtraps.
  • 3 messages refused due to their origin IP address (2 for being in the CBL, one for being in SBL20211 and SBL46450).

And the final numbers:

what # this week (distinct IPs) # last week (distinct IPs)
Bad HELOs 1147 104 1017 109
Bad bounces 117 98 80 64

By far the champion source of bad HELOs is 195.97.221.30 (335 rejections), followed by 12.162.97.71 (98 rejections). The leading general area for bad bounces seems to have switched to Italian ISPs this week. The random alphabetical names are the leading bad bounce targets, but no one of them particularly stands out.

SpamSummary-2006-12-23 written at 23:26:17; Add Comment

2006-12-21

Something to avoid in callback email address verification

Here's something I would like to grind into various people programming callback email address verification:

Don't do callback email address verification with a MAIL FROM of <> unless the address has actually sent you email.

Why? Because if an address never sends any email to start with, it may not be willing to receive bounces (the major source of email from <>). Blocking null MAIL FROMs from sending email to such addresses is a completely rational way to block bad bounces from forged spam runs.

The people doing this that make me really grind my teeth are SourceForge, who insist that both the origin address of the email and postmaster be willing to accept mail from <>. Our postmaster address is often forged on spam and never sends email, so we would really like to refuse bounces to it. Unfortunately mailing to SourceForge hosted mailing lists is somewhat more important, although we have been known to keep postmaster blocked most of the time and manually unblock it when necessary.

Not that callback email address verification is a good idea in general. But if people are going to implement a non-good idea, I'd like them to do it in a way that doesn't make me grind my teeth in their direction.

(Although every now and then I am tempted to hack something into our mailer configuration to auto-accept every address verification attempt from certain annoying places, like Earthlink and Verizon, no matter whether or not the address actually exists. (If they actually send email, we can refuse it at the DATA phase or something.))

CallbackCheckDont written at 23:22:43; Add Comment

2006-12-17

Weekly spam summary on December 16th, 2006

This week, we:

  • got 16,689 messages from 271 different IP addresses.
  • handled 21,893 sessions from 1,229 different IP addresses.
  • received 207,766 connections from at least 62,254 different IP addresses.
  • hit a highwater of 8 connections being checked at once.

This is about the same volume as last week, although the number of different IP addresses connecting to us is unusually large.

Day Connections different IPs
Sunday 36,194 +11,759
Monday 31,707 +9,762
Tuesday 39,486 +11,117
Wednesday 30,112 +9,187
Thursday 25,760 +7,261
Friday 26,366 +6,996
Saturday 18,141 +6,172

Kernel level packet filtering top ten:

Host/Mask           Packets   Bytes
208.99.198.64/27      29607   1776K
213.29.7.0/24         16473    988K
213.4.149.12           8042    418K
60.231.152.85          6112    311K
69.178.167.2           5894    283K
66.199.252.234         4744    285K
193.252.22.158         4657    279K
195.225.106.170        3907    234K
72.164.45.65           2696    129K
63.138.101.136         2566    123K
  • 208.99.198.64/27 is totallyfreeld.net, aka SBL48200, still not terminated by their upstream and still active, returning from two weeks ago.
  • 213.29.7.0/24 is the centrum.cz mail servers, returning from last week and still justifying their permanent block.
  • 213.4.149.12 and 193.252.22.158 return from last week.
  • 60.231.152.85 is a bigpond.net.au cablemodem, and returns from October.
  • 69.178.167.2 and 72.164.45.65 tried to send a lot of bad HELOs.
  • 66.199.252.234 and 195.225.106.170 tried to keep sending us stuff from origin addresses that had already tripped our spamtraps.
  • 63.138.101.136 is in the CBL.

Overall, this week is quieter than last week.

Connection time rejection stats:

  48974 total
  30101 dynamic IP
  13820 bad or no reverse DNS
   3483 class bl-cbl
    271 class bl-sdul
    195 class bl-dsbl
    147 class bl-njabl
     82 class bl-spews
     74 cuttingedgemedia.com
     30 class bl-sbl
     23 class bl-ordb

There was only one IP address out of the top 30 most rejected IP addresses that was rejected 100 times or more, but that was our old friend 64.166.14.222 (631 times). Twelve of the top 30 are current in the CBL, eight are currently in bl.spamcop.net, and one is in the SBL: 213.154.88.54, apparently an ADSL line in Dakar, is in SBL21134 and SBL43951. You win no prizes for guessing that both listings are for being an advance fee fraud spam source.

(Ironically it accounted for none of the SBL hits this week, because it was blocked for having no reverse DNS, and that's checked before the SBL. The lead SBL hit source is 72.5.205.109 at 13 times, in SBL45324 as part of a ROKSO listing for 'Brian Kramer' aka 'Expedite Media Group'.)

This week, Hotmail had:

  • 3 messages accepted; I suspect that at least two of them were spam.
  • no messages rejected because they came from non-Hotmail email addresses.
  • 25 messages sent to our spamtraps.
  • 4 messages refused because their sender addresses had already hit our spamtraps.
  • 3 messages refused due to their origin IP address being in the CBL.

And the final numbers:

what # this week (distinct IPs) # last week (distinct IPs)
Bad HELOs 1017 109 785 146
Bad bounces 80 64 109 95

This week there are no bad bounces to 'first_lastname' login names. They've been entirely supplanted by a random parade of alphabetical jumbles, the most popular of which was 'sxdijkhocqn' (5 times), leaved with a few things that are somewhat more plausible usernames, and a couple of old login names that no longer exist.

SpamSummary-2006-12-16 written at 04:01:35; Add Comment

2006-12-15

An unsurprising discovery about spammer behavior

Here's a recent, not entirely surprising discovery about spammer behavior: some spammers are really slow to pick up DNS updates.

We changed MX entries to point to our new SMTP frontend on late Monday afternoon. Our MX entries had the standard 24 hour timeout and our secondary servers had updated to the new zones by Tuesday morning at the latest, so by now it is more than two days after our old MX entries were required to have been purged from caches, even if they were gotten from a secondary using the old zone a mere millisecond before it updated.

And, you guessed it, spammers are still sending spam to the old MX.

(Since the new MX does spam tagging and the old one does not, this is vaguely irritating. If it was not a Friday, we might be doing something clever about the situation.)

I have to speculate about how the spam software behind this works. Clearly it doesn't do DNS lookups at the time it sends stuff, but does it do DNS lookups earlier and cache the results, or does it have a frontend that precomputes things all the way down to IP addresses? (The latter might be more useful, since it lets you use open relays too.)

Also, not all spammers and spam software does this; some spammers started hitting the new MX more or less the moment we published it, much faster than the places that send us legitimate email. (Which is not surprising; places that send us real email pretty much send us email regularly, which means that they have our MX entries in their DNS cache. A spammer's machine is probably not sending us email regularly, so is unlikely to have our MX already cached.)

SpammerBehaviorDiscovery written at 11:22:32; Add Comment

2006-12-10

Weekly spam summary on December 9th, 2006

Our SMTP frontend crashed and restarted three times this week, twice on Wednesday around 6pm and the third time today at 3:16pm, so some of our stats are really fragmentary. Still, this week we:

  • got 15,036 messages from 272 different IP addresses.
  • handled 20,984 sessions from 1,243 different IP addresses.
  • received 114,833 connections from at least 33,061 different IP addresses up to Wednesday at 4am, received 92,925 connections from at least 27,804 different IP addresses from Wednesday at 6pm until Saturday at 4am, and received 11,972 connections from at least 5,107 different IP addresses since 3:16pm today.

This appears to make connection volume around the same as last week. For the days that we have decent per-day stats, connections are running around 38,000 to 40,000 connections a day, with around 10,000 to 11,000 different IP addresses added per day.

Kernel level packet filtering top ten:

Host/Mask           Packets   Bytes
213.29.7.0/24         28527   1712K
213.4.149.12          16263    846K
69.64.75.166          15633    938K
64.166.14.222         12648    607K
194.105.128.205        6435    386K
81.92.112.2            4551    273K
202.175.95.171         4357    261K
63.162.158.16          4176    200K
202.44.165.9           3892    187K
193.252.22.158         3480    209K

Things are up from last week overall.

  • 213.29.7.0/24 is the centrum.cz mail servers, justifying their new permanent block.
  • 213.4.149.12 is terra.es, returning from October and many, many previous appearances.
  • 69.64.75.166 and 63.162.158.16 kept trying bad HELO greetings.
  • 64.166.14.222 is still a PacBell DSL line.
  • 194.105.128.205 and 81.92.112.2 both kept trying to send us stuff that had already tripped spamtraps.
  • 202.175.95.171 is in the CBL.
  • 202.44.165.9 has invalid reverse DNS and is in APNIC space; we require APNIC IP addresses to have valid reverse DNS.
  • 193.252.22.158 is a wanadoo.co.uk machine, which has wound up being in SPEWS again and has appeared here before.

Connection time rejection stats:

  58045 total
  33557 dynamic IP
  19569 bad or no reverse DNS
   3319 class bl-cbl
    210 class bl-sdul
    190 class bl-dsbl
    104 class bl-spews
     89 class bl-njabl
     76 cuttingedgemedia.com
     42 class bl-ordb
     27 class bl-sbl

This week saw some really prolific connection time rejection sources. 13 of the top 30 most rejected IP addresses were rejected 100 times or more, with the champion being 125.246.18.130 (1,124 times, all in a few minutes around 6pm on December 3rd, with enough activity that it triggered our per IP address maximum connection limits). After that we drop to 64.166.14.222 (201 times), 63.138.101.140 (172 times), and so on.

In other stats, 22 of the top 30 are currently in the CBL, and 5 are currently in bl.spamcop.net.

Here's a table of the SBL hits:

Connections SBL listing comments
9 SBL45324 a /24 ROKSO listing for Expedite Media
5 SBL39631 a spam source in .cz (listed March 29th)
4 SBL47687 a spam source (listed October 27th)
2 SBL48728 reasonably long-term spam source
2 SBL48020 a /27 ROKSO listing for Howard Minsky (listed November 3rd)
1 SBL48694 a /24 of spammers
1 SBL48348 a /24 ROKSO listing for 'livemercial.com' (listed November 17th)
1 SBL46756 A ROKSO listing for William Stanley; apparently it is an open squid proxy being used by this spammer (listed September 18th)
1 SBL41737 a spammer's mail sending machine (listed May 10th)
1 SBL41344 a /21 listing for a spammer's web hosting (listed May 17th)

It's interesting that this time around there's not a single advance fee fraud spam source on the list. If I'm really lucky, this means that (SBL-listed) advance fee fraud spam sources are cleaning up their act, but I suspect that it is more likely that spammers are learning to not bother using SBL-listed free webmail systems.

This week, Hotmail had:

  • 1 message accepted.
  • No messages rejected because they came from non-Hotmail email addresses.
  • 27 messages sent to our spamtraps.
  • 1 message refused because its sender address had already hit our spamtraps.
  • 3 messages refused due to their origin IP address (one from Nigeria, one from the Cote d'Ivoire, and one from Burkina Faso)

And the final numbers:

what # this week (distinct IPs) # last week (distinct IPs)
Bad HELOs 785 146 1059 155
Bad bounces 109 95 109 101

The first_last female Slavic names staged a huge comeback this week, although they don't quite make up a majority of the bad bounces; it looks like that honor is captured by the random alphanumeric jumble login names.

(One amusement in all of these stats is watching a single first name be associated with a run of last names, for example 'alisa petrova', then polkyakova, then osipova. I suspect that this is just brute force table merging of first names and last names.)

SpamSummary-2006-12-09 written at 00:31:00; Add Comment

2006-12-02

Weekly spam summary on December 2nd, 2006

Our SMTP frontend crashed and restarted today at 2:51pm, which means that some stats are a little bit distorted. This week, we:

  • got 15,320 messages from 276 different IP addresses.
  • handled 21,412 sessions from 1,467 different IP addresses.
  • received 217,984 connections from at least 66,248 different IP addresses up until this morning at 4am, and 11,150 connections from at least 4,184 different IP addresses since 2:51pm.
  • hit a highwater of 50 connections being checked at once by 4am this morning (and a less impressive highwater of 9 since 2:51pm).

Connection count is up from last week, although nothing else really is. Removing today from the per-day table, we have:

Day Connections different IPs
Sunday 40,151 +15,122
Monday 39,803 +12,027
Tuesday 31,702 +9,861
Wednesday 34,586 +10,595
Thursday 42,762 +10,402
Friday 28,980 +8,241

This is more see-sawing than we usually see, especially on Sunday. The highwater of 50 simultaneous connections was set on Thursday, which isn't too surprising.

Kernel level packet filtering top ten:

Host/Mask           Packets   Bytes
208.99.198.64/27      38955   2337K
213.29.7.0/24         29146   1749K
64.166.14.222         13032    625K
212.11.40.130          5965    358K
81.115.40.8            5039    269K
212.216.176.0/24       3996    199K
217.16.29.50           3975    239K
66.79.27.66            3896    234K
216.64.81.10           3454    166K
63.138.101.139         3369    162K
  • 208.99.198.64/27 is SBL48200, returning from last week and now earning a place in our permanent blocks.
  • 213.29.7.0/24 is centrum.cz, also returning and also earning a permanent block.
  • 64.166.14.222 also returns from last week, still a PacBell DSL line. Evidently it really, really wants to talk to us.
  • 212.11.40.130 and 81.115.40.8 are both generic 'dynamic' IPs, from easnet.fr and telecomitalia.it respectively.
  • 217.16.29.50 aka by.ru spent too much trying to send us spam that had already hit our spamtraps.
  • 216.64.81.10 kept trying a bad HELO too much.
  • 63.138.101.139 is in the CBL. I note with interest that despite being called 'mx03.simon-mx.com', the netblock it is in allegedly belongs to 'IMARKETING CONSULTANTS' (under PaeTec), allegedly located in Florida.

Overall volume seems down from last week; there are fewer really active sources, discounting SBL48200.

Connection time rejection stats:

  70836 total
  45848 dynamic IP
  17887 bad or no reverse DNS
   5198 class bl-cbl
    645 class bl-sdul
    250 class bl-dsbl
     90 class bl-sbl
     61 class bl-njabl
     58 class bl-spews
     22 class bl-ordb

As I sometime like to say, yow! This may be the highest rejection count we've ever had, and it certainly seems like a significant spam storm hit us this week. The most active sources of dynamic IPs are:

   3064 rr.com
   2336 proxad.net
   1817 retail.telecomitalia.it
   1623 comcast.net
   1553 ono.com
   1423 dynamicip.rima-tde.net
   1383 user.auna.net
   1312 verizon
   1209 wanadoo.fr
   1118 charter.com

Only two of the top 30 most rejected IP addresses were rejected 100 times or more: 200.72.136.178 (135 times, rejected for being a LACNIC IP address with no reverse DNS) and our friend 63.138.101.138 (130 times). 21 of the top 30 are currently in the CBL and 9 are currently in bl.spamcop.net.

This week, Hotmail managed:

  • 1 message accepted.
  • 1 message rejected because it came from a non-Hotmail email address (in this case an address at 'alliedpersonelsvcinc.co.uk').
  • 28 messages sent to our spamtraps.
  • 2 messages refused because their sender addresses had already hit our spamtraps.
  • 1 messages refused due to its origin IP address being in the Cote d'Ivoire.

This is better than last week, but that's still not saying very much.

what # this week (distinct IPs) # last week (distinct IPs)
Bad HELOs 1059 155 2148 161
Bad bounces 109 101 412 319

The clear winner in the bad HELO sweepstakes is 210.171.112.2, with 136 attempts before it got blocked. No one won the bad bounces sweepstakes; as you can guess from the numbers, only a very few places even sent us more than one.

This week the first_last login name pattern bounces went away almost completely. What's left is primarily plausible usernames (generally not ones that were ever valid here), leavened with a few alphanumeric jumbles.

SpamSummary-2006-12-02 written at 23:28:15; Add Comment


Page tools: See As Normal.
Search:
Login: Password:
Atom Syndication: Recent Pages, Recent Comments.

This dinky wiki is brought to you by the Insane Hackers Guild, Python sub-branch.