Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Noticeable trend on my mailserver: Spam that comes via IPv6 is 90% from Google servers and the rest is Amazon or Microsoft servers.

Noticeable trend on my mailserver: Spam that comes via IPv6 is 90% from Google servers and the rest is Amazon or Microsoft servers.

Scheduled Pinned Locked Moved Uncategorized
selfhostmailadmin
19 Posts 7 Posters 27 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • heuveltop@social.vivaldi.netH heuveltop@social.vivaldi.net

    @jwildeboer Do you block them by IP or by domain?

    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
    jwildeboer@social.wildeboer.net
    wrote last edited by
    #5

    @heuveltop IP.

    heuveltop@social.vivaldi.netH 1 Reply Last reply
    0
    • tramtrist@famichiki.jpT tramtrist@famichiki.jp

      @jwildeboer so glad you posted this. Huge uptrend for me in the last month from google ipv6 2002::

      osmodia@ms.monkeyspace.netO This user is from outside of this forum
      osmodia@ms.monkeyspace.netO This user is from outside of this forum
      osmodia@ms.monkeyspace.net
      wrote last edited by
      #6

      @tramtrist @jwildeboer So true

      1 Reply Last reply
      0
      • tramtrist@famichiki.jpT This user is from outside of this forum
        tramtrist@famichiki.jpT This user is from outside of this forum
        tramtrist@famichiki.jp
        wrote last edited by
        #7

        @larsmb @jwildeboer wait I don’t get it. How can we track their AS?

        1 Reply Last reply
        0
        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

          Hostgnome uses a simple tactic. They rent/buy IPv4 address pools, send spam via all allocated addresses in that space for a few days and then get rid of the pool, replacing it with a fresh one. So it makes sense to have a cronjob that checks their ASes and immediately block all pools on the firewall.

          #SelfHost #MailAdmin @homelab

          rpbook@gts.phillipsuk.orgR This user is from outside of this forum
          rpbook@gts.phillipsuk.orgR This user is from outside of this forum
          rpbook@gts.phillipsuk.org
          wrote last edited by
          #8

          @homelab @jwildeboer I have questions, if you don't mind.

          1. How long do you block the IPs for?
          2. How do you find the ASs/could you share the cron job?
          jwildeboer@social.wildeboer.netJ 1 Reply Last reply
          0
          • tramtrist@famichiki.jpT tramtrist@famichiki.jp

            @jwildeboer so glad you posted this. Huge uptrend for me in the last month from google ipv6 2002::

            rpbook@gts.phillipsuk.orgR This user is from outside of this forum
            rpbook@gts.phillipsuk.orgR This user is from outside of this forum
            rpbook@gts.phillipsuk.org
            wrote last edited by
            #9

            @jwildeboer @tramtrist a lot of the spam I get these days is from GMail addresses.

            1 Reply Last reply
            0
            • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

              @heuveltop IP.

              heuveltop@social.vivaldi.netH This user is from outside of this forum
              heuveltop@social.vivaldi.netH This user is from outside of this forum
              heuveltop@social.vivaldi.net
              wrote last edited by
              #10

              @jwildeboer Can you share with us the source of the list of IP addressen?

              jwildeboer@social.wildeboer.netJ 1 Reply Last reply
              0
              • jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                jwildeboer@social.wildeboer.net
                wrote last edited by
                #11

                @larsmb @tramtrist Yep. Use AS to find assigned ranges, feed them to firewall. Every 12 hours.

                1 Reply Last reply
                0
                • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                  Hostgnome uses a simple tactic. They rent/buy IPv4 address pools, send spam via all allocated addresses in that space for a few days and then get rid of the pool, replacing it with a fresh one. So it makes sense to have a cronjob that checks their ASes and immediately block all pools on the firewall.

                  #SelfHost #MailAdmin @homelab

                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                  jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                  jwildeboer@social.wildeboer.net
                  wrote last edited by
                  #12

                  Because a few people asked how I block the IP ranges from hostgnome:

                  - Mailserver detects IP address trying to to deliver spam: 91.237.124.193
                  - Via `whois` I find the corresponding AS: 201579 (picture 1)
                  - Then I find all IP ranges associated with with this AS (picture 2)
                  - Then I go through the ranges and add them to my firewall.

                  Rinse, repeat.

                  #SelfHost #MailAdmin @homelab

                  Link Preview ImageLink Preview Image
                  shaman007@mastodon.andreybondarenko.comS anton@social.dollmaier.nameA 2 Replies Last reply
                  1
                  0
                  • rpbook@gts.phillipsuk.orgR rpbook@gts.phillipsuk.org

                    @homelab @jwildeboer I have questions, if you don't mind.

                    1. How long do you block the IPs for?
                    2. How do you find the ASs/could you share the cron job?
                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                    jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                    jwildeboer@social.wildeboer.net
                    wrote last edited by
                    #13

                    @rpbook See https://social.wildeboer.net/@jwildeboer/116058656812877639 I will not share for how long I block these ranges, but definitely for more than a few days or weeks 🙂

                    1 Reply Last reply
                    0
                    • heuveltop@social.vivaldi.netH heuveltop@social.vivaldi.net

                      @jwildeboer Can you share with us the source of the list of IP addressen?

                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                      jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                      jwildeboer@social.wildeboer.net
                      wrote last edited by
                      #14

                      @heuveltop `whois` and AS lookup. See https://social.wildeboer.net/@jwildeboer/116058656812877639

                      1 Reply Last reply
                      0
                      • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                        Because a few people asked how I block the IP ranges from hostgnome:

                        - Mailserver detects IP address trying to to deliver spam: 91.237.124.193
                        - Via `whois` I find the corresponding AS: 201579 (picture 1)
                        - Then I find all IP ranges associated with with this AS (picture 2)
                        - Then I go through the ranges and add them to my firewall.

                        Rinse, repeat.

                        #SelfHost #MailAdmin @homelab

                        Link Preview ImageLink Preview Image
                        shaman007@mastodon.andreybondarenko.comS This user is from outside of this forum
                        shaman007@mastodon.andreybondarenko.comS This user is from outside of this forum
                        shaman007@mastodon.andreybondarenko.com
                        wrote last edited by
                        #15

                        @jwildeboer @homelab typo AS201579, not AS20579.

                        jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                        0
                        • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                          Because a few people asked how I block the IP ranges from hostgnome:

                          - Mailserver detects IP address trying to to deliver spam: 91.237.124.193
                          - Via `whois` I find the corresponding AS: 201579 (picture 1)
                          - Then I find all IP ranges associated with with this AS (picture 2)
                          - Then I go through the ranges and add them to my firewall.

                          Rinse, repeat.

                          #SelfHost #MailAdmin @homelab

                          Link Preview ImageLink Preview Image
                          anton@social.dollmaier.nameA This user is from outside of this forum
                          anton@social.dollmaier.nameA This user is from outside of this forum
                          anton@social.dollmaier.name
                          wrote last edited by
                          #16

                          @jwildeboer if you want, you can automate that part by querying radb.net:
                          ```
                          ./filter.sh AS201579
                          23.166.72.0/24
                          62.169.151.0/24
                          84.32.41.0/24
                          91.237.124.0/24
                          185.91.69.0/24
                          193.138.195.0/24
                          # ./filter.sh --ipv6 AS201579
                          2a13:2480::/29
                          2602:f9e4::/36
                          ```
                          Source: https://share.aditsystems.de/ztdku91ezQ/filter.sh

                          jwildeboer@social.wildeboer.netJ 1 Reply Last reply
                          0
                          • anton@social.dollmaier.nameA anton@social.dollmaier.name

                            @jwildeboer if you want, you can automate that part by querying radb.net:
                            ```
                            ./filter.sh AS201579
                            23.166.72.0/24
                            62.169.151.0/24
                            84.32.41.0/24
                            91.237.124.0/24
                            185.91.69.0/24
                            193.138.195.0/24
                            # ./filter.sh --ipv6 AS201579
                            2a13:2480::/29
                            2602:f9e4::/36
                            ```
                            Source: https://share.aditsystems.de/ztdku91ezQ/filter.sh

                            jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                            jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                            jwildeboer@social.wildeboer.net
                            wrote last edited by
                            #17

                            @anton Oooh! Nice! I will extend that to add the ranges to my crowdsec based firewall 🙂 Far better than my crude script. Thank you for sharing!

                            anton@social.dollmaier.nameA 1 Reply Last reply
                            0
                            • shaman007@mastodon.andreybondarenko.comS shaman007@mastodon.andreybondarenko.com

                              @jwildeboer @homelab typo AS201579, not AS20579.

                              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                              jwildeboer@social.wildeboer.netJ This user is from outside of this forum
                              jwildeboer@social.wildeboer.net
                              wrote last edited by
                              #18

                              @shaman007 thx! fixed.

                              1 Reply Last reply
                              0
                              • jwildeboer@social.wildeboer.netJ jwildeboer@social.wildeboer.net

                                @anton Oooh! Nice! I will extend that to add the ranges to my crowdsec based firewall 🙂 Far better than my crude script. Thank you for sharing!

                                anton@social.dollmaier.nameA This user is from outside of this forum
                                anton@social.dollmaier.nameA This user is from outside of this forum
                                anton@social.dollmaier.name
                                wrote last edited by
                                #19

                                @jwildeboer nicht von mir. Liegt seit einigen Jahren auf der Festplatte rum.

                                1 Reply Last reply
                                0
                                • R relay@relay.an.exchange shared this topic
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups