We also had a spammer using a compromised user account from this IP 2001:470:1:67::1e and while surge does in fact support ipv6 notation most places and we use those successfully, we have started using iptables for criminals that do this. The user account was compromised via an infected m$ pc. Gotta love Redmond. --Ed On 11/05/2012 03:26 PM, VinnyHIDDEN@@Dell.com wrote: > This is the first I've seen this so far from an IPv6 address. It's always the criminals that adopt new technology faster than the public. :) > > With this in mind, does Surgemail have the same limiters in place for IPv6 as IPv4 addresses for protection? I'm just thinking quickly out loud, but perhaps the block should be on a /64 basis since it would be trivial to keep jumping around inside the /64 to bypass limiters of a single /128 address. > > -Vinny > > -----Original Message----- > From: Mail System [mailtoHIDDEN@llurian.net] > Sent: Monday, November 05, 2012 8:11 AM > To:HIDDEN@llurian.net > Subject: Spammer sending detected on 2607:f298:2:121::ef6:ef83 from multiple ip addresses (8), change users password urgently, or set g_breakin_whiteHIDDEN@tellurian.com or disable by setting to *, use tellmail breakin_release to unlock the account > > Important report from SurgeMail mail1.tellurian.net host=mail1 - see details below > > Spammer sending detected on 2607:f298:2:121::ef6:ef83 from multiple ip addresses (8), change users password urgently, or set g_breakin_white ******************* or disable by setting to *, use tellmail breakin_release to unlock the account > > -- ----------------------------------------------------------- EAS Enterprises LLC World Class Web and Email Hosting Solutions IPv6 ready today for your needs of tomorrow! Ask us about dual-stacking your site www.easent.net
Last Message | Next Message