• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.

Span - relaylock: /var/qmail/bin/relaylock

J

javisan43

Guest
I've been several days with attacks from multiple IP.
I reviewed the logs (maillog) and Ip that reflects is that really sends.
Is there a way to see the real IP and stop this attack?
Submit a few records maillog to see this kind of attack.
C:Documents and SettingsPacoEscritoriomaillog/150786: Oct 4 19:35:16 venalsur relaylock: /var/qmail/bin/relaylock: mail from 86.101.81.107:9221 (catv-86-101-81-107.catv.broadband.hu)
C:Documents and SettingsPacoEscritoriomaillog/150861: Oct 4 19:35:39 venalsur relaylock: /var/qmail/bin/relaylock: mail from 88.250.174.247:16868 (dsl88-250-44791.ttnet.net.tr)
C:Documents and SettingsPacoEscritoriomaillog/150905: Oct 4 19:35:59 venalsur relaylock: /var/qmail/bin/relaylock: mail from 65.48.189.248:4888 (mail.venalsur.es)
C:Documents and SettingsPacoEscritoriomaillog/150930: Oct 4 19:36:16 venalsur relaylock: /var/qmail/bin/relaylock: mail from 80.160.76.197:39109 (fep33.mail.dk)
Any idea as to this attack? - I use plesk 4.0
 
These are perfectly normal (and usually meaningless) log messages. And what is not real about these IP addresses?
 
Back
Top