SMTP queues sending spam. How can i find what PC is sending these messages

344655 pts.
Tags:
Exchange 2003
Exchange security
SMTP
Spam
A question submitted on SearchExchange.com It appears a PC on our network has a virus. This morning I found a few hundred messages in the SMTP queues being sent from security@eppi-card.com and security@eppi-card.co.us to hundreds of domains. Is there a way to see which PC sent these messages? Maybe a log showing the IP address that submitted the messages to the SMTP queue? I'm running Exchange 2003.

Answer Wiki

Thanks. We'll let you know when a new response is added.

Take a look at the message headers on the spam messages. A website that can assist with this task is <a href=”http://headertool.apelord.com/”>here</a>. You will be looking for the ip address of the first device in the chain. This will give you the host IP address (provided DHCP is not in use and the address has been released).

You could also scan your network for devices sending traffic on port 25.

Discuss This Question:  

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following