Forum Moderators: coopster
mail server hacking attempts
118.96.14.120 from AUSTRALIA
Contact with ...
Name: ayihvic 947258
E-mail: qpobss@tofhmc.com
SrmREJ <a href="http://imaicmovbcwm.com/">imaicmovbcwm</a>, xaikcuohlqsd [xaikcuohlqsd.com], [link=http://euedorcwpoue.com/]euedorcwpoue[/link], [clidzkjcpkuv.com...]
82.76.164.212 from ROMANIA
Contact with ...
Nombre: plqysro 45020
E-mail: gdevlv@hpxizk.com
3OQyfv <a href="http://popdzyrtavhn.com/">popdzyrtavhn</a>, pmipunnidneh [pmipunnidneh.com], [link=http://qjiqoshdvkty.com/]qjiqoshdvkty[/link], [inzihgthufxt.com...]
How can I avoid those people even sending test mail?
Every user input is a potential hack. Every user input is a potential hack. Every user input is a potential hack.
This will lead them to your form, whatever it's named. You can arbitrarily change the file name, they will still find you.
SIMPLE challenge/response: Easier than dreaded CAPTCHA, ask "what is three plus five?" and set your script to accept EITHER a case-insensitive eight or 8. Change it as often as you need. I've only had to do this in CMS's that won't allow me to filter input.
Once they do that, they only need to find the form action.