即使未创建电子邮件帐户,也会发送Wordpress +后缀+未经请求的电子邮件

时间:2014-03-02 15:36:34

标签: php wordpress email postfix-mta

我在wordpress上运行博客。最近我收到服务器的滥用投诉,经过验证后返回:

============================================================ 
Received: from [192.241.188.154] by usfamily.net 
(USFamily MTA v5/:PG5vcm1hX2NoYW1iZXJzQG1yaW5hbHB1cm9oaXQuY29tPjxkamtpbm5leUB1c2ZhbWlseS5uZXQ_)
with SMTP id <20140301115044001084500013> for <djkinney@usfamily.net>; 
Sat, 01 Mar 2014 11:50:44 -0600 (CST) 
(envelope-from norma_chambers@myblog.com, notifiable emailnetwork 192.241.188.) 
Received: by myprimarydomain.com (Postfix, from userid 498) 
id 1C5EE1305AE; Sat, 1 Mar 2014 17:12:39 +0000 (UTC) 
To: djkinney@usfamily.net 
Subject: FW: Good day 
X-PHP-Originating-Script: 498:sslnEn.php 
From: "Norma Chambers" <norma_chambers@myblog.com> 
Reply-To: "Norma Chambers" <norma_chambers@myblog.com> 
X-Priority: 3 (Normal) 
MIME-Version: 1.0 
Content-Type: text/html; charset="iso-8859-1" 
Message-Id: <20140301171239.1C5EE1305AE@myblog.com> 
Date: Sat, 1 Mar 2014 17:12:39 +0000 (UTC) 
Content-Transfer-Encoding: quoted-printable

<div> 
<p> 
Top Meds Website good deal <a href=3D"http://dumantarim.com/modules/mod_= 
araticlhess/rlf.html">http://dumantarim.com/modules/mod_araticlhess/rlf.h= 
tml</a> 
</p> 
</div>

============================================================

现在我认为这意味着: 从id norma_chambers@myblog.com发送了几封不请自来的电子邮件。如果我的假设是正确的,则此电子邮件ID应该存在于VPS上,并且用户可以访问电子邮件帐户以发送邮件。这真的意味着我的服务器(VPS)被黑了吗?

我是否正确地追踪此问题?请详细说明。

1 个答案:

答案 0 :(得分:0)

作为一种帮助我的解决方法,答案并非如此。通过简单地将wordpress的目录路径从\ wordpress \更改为\ dennis \修复了99%的这些问题。看来大多数攻击都是基于默认名称和路径。