Hi.
More about … :)
@BBcan177:
I have tried to do this in postfix but couldn't find a solution, so I ended up adding a custom rule to Snort…
Getting hit by a usually EHLO ylmf-pc (Chinese OS)
Snort won't block it fast enough to prevent a couple login attempts, but it will stop an IP after about three attempts. This is because currently Snort is acting on a copy of the packet.
alert tcp $EXTERNAL_NET any -> any 25 (msg:"SMTP EHLO from ylmf-pc attempt"; threshold: type limit, track by_src, count 1, seconds 60; content:"ylmf-pc"; nocase; classtype:suspicious-login; sid:9000032; rev:2;)
Rgards.