I have installed fail2ban on my mail server, and the logs show 4-5 IPs regularly hitting my server at large intervals (so not often enough to trigger the fail2ban rules):
2017-10-04 06:29:04,705 fail2ban.filter [1091]: INFO [postfix-sasl] Found 92.xxx.xxx.11
2017-10-04 07:14:35,674 fail2ban.filter [1091]: INFO [postfix-sasl] Found 37.xxx.xxx.118
2017-10-04 08:01:29,732 fail2ban.filter [1091]: INFO [postfix-sasl] Found 37.xxx.xxx.118
2017-10-04 08:08:45,221 fail2ban.filter [1091]: INFO [postfix-sasl] Found 92.xxx.xxx.11
2017-10-04 08:48:00,802 fail2ban.filter [1091]: INFO [postfix-sasl] Found 37.xxx.xxx.118
2017-10-04 09:36:07,958 fail2ban.filter [1091]: INFO [postfix-sasl] Found 37.xxx.xxx.118
2017-10-04 09:48:59,830 fail2ban.filter [1091]: INFO [postfix-sasl] Found 92.xxx.xxx.11
2017-10-04 10:23:22,123 fail2ban.filter [1091]: INFO [postfix-sasl] Found 37.xxx.xxx.118
2017-10-04 11:12:03,283 fail2ban.filter [1091]: INFO [postfix-sasl] Found 37.xxx.xxx.118
The IPs are all VPS'es, belonging to Digital Ocean, OVH and the like. A back-of-the-envelope calculation shows that, if the attacker checks one password every 40 minutes, they'll exhaust a 10 000-word dictionary in a little less than a year. (Not that my passwords are dictionary words, mind you). I guess it can pay off if the attacker is hitting thousands of servers simultaneously.
Should I be concerned about this type of attacks?