The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Server abused by e-mail SPAM

Discussion in 'Security' started by Galanthus, Jan 14, 2014.

  1. Galanthus

    Galanthus Well-Known Member

    Joined:
    Nov 8, 2013
    Messages:
    87
    Likes Received:
    0
    Trophy Points:
    6
    cPanel Access Level:
    Root Administrator
    :mad: Hello guys i really hope that somebody can help. I have finally stopped 90% of the phising scripts. Now i have another problem. in Mail Queue Manager i have a sender which i can not block or stop also there is no IP to stop this stupid hack.

    Please see my screenshot:
    [​IMG]

    Please help so i can stop this
     
  2. ThinIce

    ThinIce Well-Known Member

    Joined:
    Apr 27, 2006
    Messages:
    346
    Likes Received:
    7
    Trophy Points:
    18
    Location:
    Disillusioned in England
    cPanel Access Level:
    Root Administrator
    You'll need to look at the details for the message to ascertain how it was submitted to the mail server (script, user auth, whatever). You should be able to see this either from the details link (the magnifing glass) or by examining the exim logs themselves in /var/log/exim_mainlog. Paste us the details here if you aren't sure what you're looking at.

    I'd imagine you've already been through How to: Prevent Email Abuse but there are some good basic things to configure in there if not, depending on how you already have things configured on your system.
     
  3. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    30,764
    Likes Received:
    662
    Trophy Points:
    113
    cPanel Access Level:
    Root Administrator
    Hello :)

    The image you provided shows the user, but you will need to view one of the actual messages and review the mail header for more information on how it was sent. Look to see if it was sent from a script or via direct SMTP authentication.

    Thank you.
     
Loading...

Share This Page