thanks all
figured this out.
i had recently updated qmail and it reinstalled sendmail binary.
i have removed this and also taken necessary precautions for tracking the
culprits
rajesh
- Original Message -
From: Jaime Lerner [mailto:jaimeler...@geekgoddess.com]
To: qmailtoaster-list@q
Also check your /var/log/qmail/submission/current for bad activity
Pedro Estevão wrote:
Are you talking on a ilegit web hosting issue (script under wordpress site) or
a ilegit access to your webmail (squirrelmail)?
Or if I miss understood what are web hosting and webmail related?
-Origina
Check your /var/log/maillog for lots of different IPs sending through
one account via smtp, or create a phpmail log file to detect where the
bad script is, like this:
https://blog.rimuhosting.com/2012/09/20/finding-spam-sending-scripts-on-your-server/
Pedro Estevão wrote:
Are you talking on
Are you talking on a ilegit web hosting issue (script under wordpress site) or
a ilegit access to your webmail (squirrelmail)?
Or if I miss understood what are web hosting and webmail related?
-Original Message-
From: Rajesh M [mailto:24x7ser...@24x7server.net]
Sent: 16 August 2017 14:22
My guess is the spammer is using php's mail() function and you have your
server set up so the mail function goes into qmail rather than something
else. As long as you have your localhost allowed (as you do), any script
using the local mail() function will have full access.
From: Rajesh M <24x7ser