Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Finding internal spammer on Plesk 10

Posted on 2013-02-07
1
Medium Priority
?
1,298 Views
Last Modified: 2013-02-08
Hi,

I am running a Plesk 10 server, an have run unto a problem.

Someone on the server has a script, that allows users to submit somee spammails, but I have a hard time identifying what user.

Lookin at the headers in the mail in the mailqueue dont show much:
Received: by server.com (Postfix, from userid 33)
                             id A4768D680D5; Wed,  6 Feb 2013 20:24:12 +0100 (CET)
To: jorg_ruppenstein@abitibiconsolidated.com
Subject: Tracking Service
From: "Manager Aiden Morin" <service@lincoln.us>
X-Mailer: MailMagic2.3
Reply-To: "Manager Aiden Morin" <service@lincoln.us>
Mime-Version: 1.0
Content-Type: multipart/alternative;boundary="----------13601786525112ADDC61356"
Message-Id: <20130206192412.A4768D680D5@server.com>
Date: Wed,  6 Feb 2013 20:24:12 +0100 (CET)

Uid is www-data, and could be anyone.
Maillog does not give any further info.

Anyone with an idea how to identify the user/account/domain?

/jbe
0
Comment
Question by:dk_jb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
dk_jb earned 0 total points
ID: 38867265
Found the solutionm: http://kb.parallels.com/en/1711

/Jbe
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Want to know how to use Exchange Server Eseutil command? Go through this article as it gives you the know-how.
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question