1. Please take a little time for this simple survey! Thank you for participating!
    Dismiss Notice
  2. Dear Pleskians, please read this carefully! New attachments and other rules Thank you!
    Dismiss Notice
  3. Dear Pleskians, I really hope that you will share your opinion in this Special topic for chatter about Plesk in the Clouds. Thank you!
    Dismiss Notice

Span - relaylock: /var/qmail/bin/relaylock

Discussion in 'Plesk for Linux - 8.x and Older' started by javisan43, Oct 6, 2008.

  1. javisan43

    javisan43 Guest

    I've been several days with attacks from multiple IP.
    I reviewed the logs (maillog) and Ip that reflects is that really sends.
    Is there a way to see the real IP and stop this attack?
    Submit a few records maillog to see this kind of attack.
    C:Documents and SettingsPacoEscritoriomaillog/150786: Oct 4 19:35:16 venalsur relaylock: /var/qmail/bin/relaylock: mail from (catv-86-101-81-107.catv.broadband.hu)
    C:Documents and SettingsPacoEscritoriomaillog/150861: Oct 4 19:35:39 venalsur relaylock: /var/qmail/bin/relaylock: mail from (dsl88-250-44791.ttnet.net.tr)
    C:Documents and SettingsPacoEscritoriomaillog/150905: Oct 4 19:35:59 venalsur relaylock: /var/qmail/bin/relaylock: mail from (mail.venalsur.es)
    C:Documents and SettingsPacoEscritoriomaillog/150930: Oct 4 19:36:16 venalsur relaylock: /var/qmail/bin/relaylock: mail from (fep33.mail.dk)
    Any idea as to this attack? - I use plesk 4.0
  2. breun

    breun Golden Pleskian

    Jun 28, 2005
    Likes Received:
    These are perfectly normal (and usually meaningless) log messages. And what is not real about these IP addresses?