It was fairly simple to manually add an IPtable rule to block this one IP address, and the attack stopped.
But I cannot think of a reason someone would want access to IMAP accounts. What purpose would this serve?
Chris
It was fairly simple to manually add an IPtable rule to block this one IP address, and the attack stopped.
But I cannot think of a reason someone would want access to IMAP accounts. What purpose would this serve?
Chris