Nothing speaks louder than statistics. We want to provide you with real world statistics of how our BMS system works. Here are some comparisons of the effectiveness of various public blacklists, of spam statistics in general, of the spam source, and how mail servers using the BMS system fair in the stopping spam.
We will be putting more and more statistics online when ever we can, and we are always glad to receive statistic reports from people using our products. If you have implemented the BMS Client Programs on your mail server, please feel free to share those results here. As well, if you are using the Complete BMS Remastering System for your own lists, and want to share those stats, we are also glad to have them, even if your lists are commercial or private. The idea is to stop spam, and if you feel your lists are better than the public ones, feel free to share them.
Range of IPv4 Address Space represented by the blacklists provided here.
Eventually, we will provide live statistics, but here are a few notes on our experience with individual lists provided, to help you select which ones you might like to activate.
SPEWS: These lists are not activated by default. By using SPEWS the listed ISPs will have more reason to address the issues that got them on the list, however in real world environments, several very large ISPs were blocked (ie Comcast and Shaw at one time), and too many users complained when they could not get mail from those places. Our only assertion in this matter, is that although we agree that ISPs need to pay attention to mail addressed to 'abuse@', so should the list maintainers make it easy for the ISPs to contact the list masters. Use it if you wish to take the high road. They have very valid reasons for listing ISPs.
NOTE: The information provided below is for statistical use only, and terms like 'offender' are not meant to indicate one network or company as in any way more responsible, or irresponsible than another, but are simply used to denote detected volumes of spam used in statistics. LinuxMagic only offers statistical evidence and does not make a comment against any particular network or country.
This is a quick listing of spam caught by the lists, by country. Note that we are just listing the top sources (you can contact us for a complete list). Note, that it isn't the total percentages that count, but the difference between % connected and % blocked.
|Country||% of Connections||% blocked|
We did an analysis on a small Canadian ISP for one day and they received 33360 messages, of which approximately 98% was rated as spam. From their logs, we were able to determine the country of origin for xx% or xxxx connections. Based on that, we determined:
|Country||Number of Connections||% of Connections|
Because of the above high ranking of Korean Spam, we took the liberty of analyzing their Spam at our server. Most Korean Blacklists tend to paint the whole country with one brush, and block everything. We decided to look at the main offending ranges, and ask them for a DUL list, so that we can only allow legitimate mail servers, which have reputable representatives who work towards stopping outbound Spam. This is a list of a quick summary of the worst offenders on our network. (Remember, it isn't that Korea is any worse than any other country, just that they have the highest number of internet connected households)
Worst Spam Offenders from Korean Networks
Small Random Sampling
|Network Name||Number of Spams|
Kind of obvious which ISP's need blocking
In the case of China, because of the nature of the ISP, all mail connections were the result of spam, or spam bounces. Looking at their connections which were 4% of the small ISP's connections, we looked at these 1294 connections. We should point out that no attempt was made to identify how many spam bounces, were the result of Spam originating from China, and bouncing off of US servers. We were able to identify the network of origin for these connections , and broke them down into the worst offenders. In the case of China, we were surprised to see how many different networks originated the Spam. Possibly Windows Virus and Trojans are more prevalent there than we thought. 190 different network groups.. But we have listed the top of the bunch only. And here is a typical header from there.
It advertises BulkMailing to 28 million addresses :) Sent from:
inetnum: 126.96.36.199 - 188.8.131.52 netname: CNCGROUP-HA descr: CNCGROUP Henan province network descr: China Network Communications Group Corporation
Return-Path: <firstname.lastname@example.org> Received: (qmail 11568 invoked from network); 6 Oct 2004 02:16:22 -0000 Received: from unknown (HELO 184.108.40.206) (220.127.116.11) by 18.104.22.168 with SMTP; Wed, 06 Oct 2004 02:16:22 +0000 Received: from 22.214.171.124 by 126.96.36.199; Sun, 19 Sep 2004 02:13:05 -0100 Message-ID: <CCTLTMXCWMWBBDEVPBIA@myresponder.biz> From: "Mrs. Downs" <email@example.com> Reply-To: "Mrs. Downs" <firstname.lastname@example.org>
Worst Spam Offenders from Chinese Networks
Small Random Sampling
|Network Name||Number of Spams/Poor Bounces|