I owe you an apology for the post above batric… re-reading it today I’ve realized that it comes across harsher than I intended.
        
        
     
No problems 
After inspecting the logs, I found the way they were connecting - one of the email addresses had a "
test@domain.com" with password of "123456".
Spammers were randomly trying to check common email names on every domain on the server: info, contact, admin, test, support, etc.
They succeeded on 2 email addresses, and this enabled them to send email.
I configured "DDOS" protection (this is how the feature is called in SmarterMail) for SMTP, POP and IMAP, and changed the passwords in question of course.
These days there were as many as 17k blocked connections on POP and IMAP...