Solved

Finding internal spammer on Plesk 10

Posted on 2013-02-07
1
1,288 Views
Last Modified: 2013-02-08
Hi,

I am running a Plesk 10 server, an have run unto a problem.

Someone on the server has a script, that allows users to submit somee spammails, but I have a hard time identifying what user.

Lookin at the headers in the mail in the mailqueue dont show much:
Received: by server.com (Postfix, from userid 33)
                             id A4768D680D5; Wed,  6 Feb 2013 20:24:12 +0100 (CET)
To: jorg_ruppenstein@abitibiconsolidated.com
Subject: Tracking Service
From: "Manager Aiden Morin" <service@lincoln.us>
X-Mailer: MailMagic2.3
Reply-To: "Manager Aiden Morin" <service@lincoln.us>
Mime-Version: 1.0
Content-Type: multipart/alternative;boundary="----------13601786525112ADDC61356"
Message-Id: <20130206192412.A4768D680D5@server.com>
Date: Wed,  6 Feb 2013 20:24:12 +0100 (CET)

Uid is www-data, and could be anyone.
Maillog does not give any further info.

Anyone with an idea how to identify the user/account/domain?

/jbe
0
Comment
Question by:dk_jb
1 Comment
 

Accepted Solution

by:
dk_jb earned 0 total points
ID: 38867265
Found the solutionm: http://kb.parallels.com/en/1711

/Jbe
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, you will read about the trends across the human resources departments for the upcoming year. Some of them include improving employee experience, adopting new technologies, using HR software to its full extent, and integrating artifi…
All of the resources available today make learning a new digital media easier than ever-- if you know where to begin. This is a clear, simple guide to a few of the basic digital art mediums and how to begin learning them on your own.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now