Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Finding spammer on own network

    Off-Topic & Non-Support Discussion
    4
    8
    5.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      devnull
      last edited by

      Hi,

      I have PFSense running on a network and two days ago people started sending reports that emails can't be sent anymore. Yesterday evening I also got a report form the ISP that there are apparently large numbers of spam being sent from inside the network.
      Now my question is, is there any way of that PFSense could assist me in finding the spammer?
      Could I set a rule to pass traffic on port 25 and enable logging so that I could see where the spammer is? I checked he traffic graph and I can't seem to see any divination from normal traffic.

      Any idea?

      Thanks for the help and bye

      1 Reply Last reply Reply Quote 0
      • G
        glieberw
        last edited by

        Yes you can, but I think a better approach would be to place Untangle inbetween.  That gives you spam protection in both ways.  Oftenly SPAM from inside your network is not originated from your network, but likely your email server has become a (open) relay.

        Untangle can run in a bridge mode on a separate system.  YOu can get it from SourceForge of simple at untangle.com.

        ~Gerry

        1 Reply Last reply Reply Quote 0
        • dotdashD
          dotdash
          last edited by

          Darkstat might be helpful. NTOP is also helpful, but it's not 100% stable.
          I block all outgoing SMTP traffic, except from an alias list containing mail servers. That should be simple if you are in a business environment.

          1 Reply Last reply Reply Quote 0
          • D
            devnull
            last edited by

            Unfortunately the mail server is hosted elsewhere so when users send email they connect to the ISPs smtp server and send via that server (not my idea). But the ISP has informed me that there is a significant increase in email traffic and as a precaution have blocked access to their smtp server. Now the problem is I'm not sure that there even is an infected machine on the LAN but rather the past few days the department has been informing their clients of some changes and have been sending large quantities of mail (happens once or twice a year) witch could have been interpreted as a significant increase of mail traffic.
            That is why I would like to see if there is a way to trap traffic to see if in fact there is some sort of virus on one of the machines on the LAN or if the whole thing is a mistake.

            I'll try with NTOP and Darkstat. I hope I'll figure out what is the problem.

            Thanks again.

            Bye

            1 Reply Last reply Reply Quote 0
            • G
              glieberw
              last edited by

              If your users are behind your PFSense box, Untangle can track in and outbound SMTP, POP3, and IMAP (and all other protocols).

              Hope that helps….

              ~Gerry

              1 Reply Last reply Reply Quote 0
              • K
                kapara
                last edited by

                I use pflowd and ManageEngines Netflow Analyzer which gives you 2 free collectors.  This will analyze all traffic passing through you wan connection in and out.  It will allow you to analyze all traffic coming in and out by IP or port/application and sort them to see which IP is sending the most traffic out and to which IP.  This will allow you to analyze if all traffic is going to your ISP and also from which IP's.  The traffic flow is updated on a per minute basis but the port and IP info is updated approximately every 10 minutes.  I am now running this at each of my customer sites and has really helped me analyze over time who are the heavy users on my network.

                Per_IP.PNG
                Per_IP.PNG_thumb
                IP_Filter.PNG
                IP_Filter.PNG_thumb
                Application.PNG
                Application.PNG_thumb
                ![smtp filter.PNG](/public/imported_attachments/1/smtp filter.PNG)
                ![smtp filter.PNG_thumb](/public/imported_attachments/1/smtp filter.PNG_thumb)

                Skype ID:  Marinhd

                1 Reply Last reply Reply Quote 0
                • D
                  devnull
                  last edited by

                  Hi,

                  I was actually able to find the spammer quite easily since there was only one machine on the network running the whole time(the CEO's pc) and that had never been checked by anyone and it was the logical choice. And it was the right one.

                  But kapara please tell me more about this method you used with pflowd and ManageEngines. Does it run on PFS, or a separate system and how do you get it to run.

                  Thanks for the help.

                  1 Reply Last reply Reply Quote 0
                  • K
                    kapara
                    last edited by

                    Install pfflowd package, Install manageengines netflow analyzer on a server or PC.  Configure pfflowd to point to the ip of the machine with netflow analyzer.  make sure both are set to use port 9996.  Traffic should begin to show up in PC after about 10 minutes.  Make sure to unblock port 9996 on PC if using software firewall ie windows firewall.  Create an IP group for your subnet or you will not see both outbound and inbound throughput.  Set in/out bandwidth for interface and ip group.

                    Skype ID:  Marinhd

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.