• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.

How to block smtp_auth hackers what are targeting a specific account?

eugenevdm

Regular Pleskian
I get this in my Qmail log files:

tail -f /usr/local/psa/var/log/maillog | egrep -i "unable|failed|refused|error|warning|listed"

Apr 2 13:40:30 server_name smtp_auth: FAILED: [email protected] - password incorrect from 189-11-216-61.dsl.cbace701.brasiltelecom.net.br [189.11.216.61]

Apr 2 13:40:54 server_name smtp_auth: FAILED: [email protected] - password incorrect from ip-address-pool-xxx.fpt.vn [118.71.120.165]

This repeats over and over from all different IP address. At some stage the compromised user's password was changed so the spammers can't get back into that account.

However, I want to take additional precaution and permanently block those IP addresses. Please recommend something that checks for repeated failed logins on SMTP and then block the IP addresses.
 
Back
Top