Weekly spam summary on April 14th, 2007
This week, we:
- got 13,205 messages from 267 different IP addresses.
- handled 19,508 sessions from 1,153 different IP addresses.
- received 163,293 connections from at least 49,706 different IP addresses.
- hit a highwater of 11 connections being checked at once.
This is about the same volume as last week. The per day table fluctuates a fair bit, with a mid-week peak as usual:
Kernel level packet filtering top ten:
Host/Mask Packets Bytes 184.108.40.206/23 41441 2013K cox.net 220.127.116.11/24 19922 903K bellsouth.net 18.104.22.168 11532 615K 22.214.171.124 11366 546K 126.96.36.199/24 9072 544K centrum.cz 188.8.131.52/24 8826 424K adelphia.net 184.108.40.206 6721 349K 220.127.116.11 5479 256K 18.104.22.168 3936 182K 22.214.171.124 3398 163K
Volume is slightly up on last week, but not enough to be significant (especially since I merged the two Bellsouth /24 blocks into one /23). It is nice to see some of the /24s for the webmail people moving out of the top of the table, even if Cox and Bellsouth still have a lock on the top places.
- 126.96.36.199 kept trying to send email with an origin address that had already tripped our spamtraps. Judging from the specific origin address and the host name, it's a web server compromised through some PHP problem.
- 188.8.131.52 is in AccelerateBiz network space, and we no longer talk to them. Considering that it is called 'mail.allfreebiestoyou.com', I don't think we're in any danger of missing anything important.
- 184.108.40.206 returns from last week and many times before.
- 220.127.116.11 and 18.104.22.168 kept trying with bad
- 22.214.171.124 is a mundo-r.com machine, and we no longer accept email from them due to advance fee fraud webmail spam.
Connection time rejection stats:
40610 total 21905 dynamic IP 13065 bad or no reverse DNS 4207 class bl-cbl 237 acceleratebiz.com 127 dartmail.net 123 class bl-njabl 118 class bl-dsbl 107 class bl-pbl 100 class bl-sbl 73 cuttingedgemedia.com 69 postdirect.com 68 edatis.net/edt02.net 39 class bl-sdul
Here is a free hint for people trying get us to accept their email: putting sequence numbers in your domain names does not make you look good.
Technically, the highest SBL source this week is SBL51080 with 19 rejections, but this is just because 126.96.36.199/26 somehow got its listing removed some time during the week. Had it remained listed, it would have had 32 rejections.
(Because I am much less forgiving that the SBL, the otcpicksnewsN.com complex has now earned a place in our permanent blocks.)
Three of the top 30 most rejected IP addresses were rejected 100 times
or more this week: 188.8.131.52 (714 times), 184.108.40.206 (290 times),
and 220.127.116.11 (120 times). All of them are dynamic IP addresses.
Ten of the top 30 are currently in the CBL, eight are currently in
bl.spamcop.net, eleven are in the PBL, and a grand total of 14 are
(Locally, 14 were rejected as 'dynamic IP', eight were rejected for bad or missing reverse DNS, three were rejected for being on various DNS blocklists, three were rejected for being in AccelerateBiz network space, and there was one from Cutting Edge Media and one from edatis.net. It was a varied week for the top 30.)
This week Hotmail managed:
- 1 message accepted.
- no messages rejected because they came from non-Hotmail email addresses.
- 30 messages sent to our spamtraps.
- 1 message refused because its sender addresses had already hit our spamtraps.
- 5 messages refused due to their origin IP address (two in the CBL, two from the Cote d'Ivoire, and one in SBL44668, which dates from August 12th 2006).
And the final numbers:
|what||# this week||(distinct IPs)||# last week||(distinct IPs)|
The most active sources of bad
HELOs were 18.104.22.168 (73 rejections)
and 22.214.171.124 (70 rejections). The only spot of brightness is that
at least fewer machines seem to be hitting us with bad
Bad bounces were sent to 39 different bad usernames this week. The
leading targets were two ex-users, but the dominant sort of target was
ShawnOtto. A few went to usernames like
a few to other local past usernames, and there was one to a random
jumble username. As with last week, Earthlink was the dominant
source of bad bounces.