(The IP addresses that are often tried to log in, including the IP addresses that are illegally connected to the mail server, and the IP addresses that are tentatively connected to SSH, are collected. People can add them to the blacklist, and they often connect to other people's machines.)