My email server has been under constant brute force attack for a while now, without success. Recently, however, these bots or automated scripts have found a way to "use my own static IP" in an attempt to break into the email server.
I am running fail2ban which is now "banning my own static IP". My server is running Debian 10 with Postfix, Dovecot, MySql etc.
I see the attempts being made but I am not sure how to fight back. Can you suggest some steps that I might take?
Here is a sample of the hundreds of attempts made daily:
3 git.example.com[192.0.2.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
3 git.example.com[192.0.2.7]: SASL PLAIN authentication failed:
3 cloud.example.com[192.0.2.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
3 cloud.example.com[192.0.2.7]: SASL PLAIN authentication failed:
2 ltf.example.com[192.0.2.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2 ltf.example.com[192.0.2.7]: SASL PLAIN authentication failed:
2 unknown[192.0.2.7]: SASL PLAIN authentication failed:
2 unknown[192.0.2.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2 hostname www.example.com does not resolve to address 192.0.2.7: Name or service not known
6 mail.example.com[192.0.2.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6