@MicheleB,
If you know the specific domain, but not the specific mailbox, you can try to do the following.
Open a ssh console and run from the command line:
a) in order to identify the (often harmless) imap logins: grep -in "tfw dovecot: imap-login: Login: user=" /var/log/maillog
Note: the number is quite handy to determine how frequently a user is being logged in.
Note: a huge number of logins is not surprising and it is only a good sign, since it indicates a shutdown of the connection, reducing traffic.
Note: a huge number of logins for a particular mailaddress is not indicating something particular.
b) in order to identify the (often harmful) pop3 logins: grep -in "tfw dovecot: pop3-login: Login: user=" /var/log/maillog
Note: you will probably see that the list of mailaddresses is somewhat smaller than in the result from the command under point a.
c) have a look at the size of the mailboxes, resulting from the command in point b.
Note: you probably have found the culprit for the traffic spike by now and if you did not, have a look at mailbox sizes of the three most frequently occurring mailaddresses in point a.
Hope the above helps a little bit.
Please note that there are more easy ways to do this (i.e. scripting) and/or that it takes more analysis to investigate the issue (for instance, a not closed connection can cause traffic).
For the time being, the above is beyond the scope of the topic, we will return to that, if and only if necessary.
Can you report back?
Regards....