Weekly spam summary on June 2nd, 2007
This week, we:
- got 10,553 messages from 239 different IP addresses.
- handled 19,451 sessions from 1,629 different IP addresses.
- received 430,428 connections from at least 69,677 different IP addresses.
- hit a highwater of 9 connections being checked at once.
The connection volume is way up compared to last week; however, I believe that it is mostly because of one machine, 213.223.200.15, that reacted exceptionally badly to our greylisting (to the point of retrying multiple times a second). Once I worked out what was going on and blocked it, things quieted right down. You can clearly see the effects in the daily stats:
Day | Connections | different IPs |
Sunday | 17,636 | +9,702 |
Monday | 33,471 | +12,667 |
Tuesday | 184,927 | +9,388 |
Wednesday | 99,137 | +9,231 |
Thursday | 33,946 | +9,883 |
Friday | 36,539 | +10,456 |
Saturday | 24,772 | +8,350 |
The machine showed up at about 3pm Tuesday and got blocked Wednesday morning; ironically it seems to react much better to kernel level blocks and has barely sent us anything since then.
The volume may be up even apart from that, since it looks like daily volume would have been over 30,000 every weekday even without that. But it's hard to be sure.
Kernel level packet filtering top ten:
Host/Mask Packets Bytes 213.4.149.12 34323 1784K 205.152.59.0/24 21531 976K bellsouth.net 68.168.78.0/24 16420 788K adelphia.net 68.230.240.0/23 13444 653K cox.net 213.29.7.0/24 10937 655K centrum.cz 70.54.178.101 5560 267K 212.31.1.29 4665 224K 206.53.0.222 4488 210K 212.175.13.129 3506 210K 72.244.103.211 3495 163K
The overall volume is down slightly compared to last week; however, the advance fee fraud spam webmail places are back to dominating the top of the list.
- 213.4.149.12 and 212.175.13.129 return from last week.
- 70.54.178.101 kept trying to send mail with an origin address that had already tripped our spamtraps.
- 212.31.1.29 and 206.53.0.222 kept trying with bad
HELO
s. - 72.244.103.211 is something we consider a dynamic or generic IP address.
Connection time rejection stats:
58817 total 29106 dynamic IP 23124 bad or no reverse DNS 5175 class bl-cbl 343 class bl-pbl 156 qsnews.net 97 acceleratebiz.com 88 dartmail.net 79 class bl-dsbl 71 class bl-sdul 65 class bl-sbl 27 icpbounce.com 18 class bl-njabl
The highest source of SBL rejections this week was SBL30718 with 14 rejections; to my complete lack of surprise, it is an advance fee fraud spam /24 listing from September 4th 2005. Next up is last week's leading source, SBL51583 with 10 rejections.
Only one of the top 30 most rejected IP addresses was rejected 100 times
or more this week: 201.41.202.120, blocked for bad or missing reverse
DNS, was rejected 142 times. Sixteen of the top 30 are currently in the
CBL, seven are currently in bl.spamcop.net
, fourteen are in the PBL,
and a grand total of 21 are in zen.spamhaus.org.
(Locally, 16 were rejected for bad or missing reverse DNS, 12 for being dynamic IPs, and 2 because we don't want to talk to them.)
This week, Hotmail had:
- 5 messages accepted.
- no messages rejected because they came from non-Hotmail email addresses.
- 42 messages sent to our spamtraps.
- 1 message refused because its sender addresses had already hit our spamtraps.
- 7 messages refused due to their origin IP address (3 in the CBL, and four in the SBL in SBL34924 (listed November 2005), SBL49340, SBL51849, and SBL54927).
And the final numbers:
what | # this week | (distinct IPs) | # last week | (distinct IPs) |
Bad HELO s |
1369 | 142 | 624 | 92 |
Bad bounces | 349 | 187 | 190 | 94 |
The leading sources of bad HELO
s this week were 66.29.225.52 (95
tries), 74.62.83.253 (76 tries), 64.1.186.5 (72 tries), and 81.118.66.20
(71 tries). Two of these tried HELO
names that were just impossible;
the other two just tried names that were unresolvable.
Bad bounces were sent to 257 different bad usernames this week, with
the most popular by far being AmaliaDowdy
(61 attempts). This username
pattern was also the dominant form of bad username, with a few attempts
to throw in old users, hyphen-separated names like lucky-monkey
,
and some random sequences. To my surprise, w3.org appears high in the
sources list this week, and all the usual suspects from last week
are still putting in appearances.
(Of course, these days some of this may be misguided address
verification systems. Every now and then I think about clever ways to
cause them pain, like deferring refusals until after DATA
.)
|
|