Help defend the Internet! Join a community of security researchers gathering logs and running honeypots to mitigate online attacks.
The first malicious email caught in my Exim HoneyPot.
A simple yet effective way of catching systems is seeking to exploit the Exim vulnerability, And automating the abuse reporting process.
How far can you go before being just a Black Hat?