{"id":271,"date":"2025-11-21T11:30:22","date_gmt":"2025-11-21T11:30:22","guid":{"rendered":"https:\/\/adveyer.com\/blog\/?p=271"},"modified":"2025-11-21T11:30:22","modified_gmt":"2025-11-21T11:30:22","slug":"cpanel-uzerinde-spam-mail","status":"publish","type":"post","link":"https:\/\/adveyer.com\/blog\/cpanel-uzerinde-spam-mail\/","title":{"rendered":"cPanel \u00dczerinde Spam Mail G\u00f6nderen Hesab\u0131 Tespit Etme"},"content":{"rendered":"<p>Payla\u015f\u0131ml\u0131 hosting sunucular\u0131nda en s\u0131k kar\u015f\u0131la\u015f\u0131lan problemlerden biri, bir kullan\u0131c\u0131n\u0131n hesab\u0131ndan <strong>spam mail g\u00f6nderilmesi<\/strong>dir.<br \/>\nBu durum;<\/p>\n<ul>\n<li>Sunucu IP\u2019sinin kara listeye (RBL) girmesine,<\/li>\n<li>Di\u011fer m\u00fc\u015fterilerin maillerinin de spam klas\u00f6r\u00fcne d\u00fc\u015fmesine,<\/li>\n<li>Hizmet kalitesinin ve marka itibar\u0131n\u0131n zedelenmesine<\/li>\n<\/ul>\n<p>neden olur.<\/p>\n<p>Bu y\u00fczden bir sunucu y\u00f6neticisi olarak <strong>\u201ccpanel-spam-mail-gonderen-hesabi-tespit-etme\u201d<\/strong> konusuna h\u00e2kim olman kritik derecede \u00f6nemlidir.<br \/>\nBu yaz\u0131da, cPanel\/WHM kullanan bir sunucuda spam mail g\u00f6nderen hesab\u0131 tespit etmenin en pratik yollar\u0131n\u0131 ad\u0131m ad\u0131m anlataca\u011f\u0131z.<\/p>\n<h2>\u0130lk Ad\u0131m: Sorunun Varl\u0131\u011f\u0131n\u0131 Do\u011frulama<\/h2>\n<p>\u00d6nce ger\u00e7ekten spam aktivitesi olup olmad\u0131\u011f\u0131n\u0131 anlamak gerekir. Bunu birka\u00e7 \u015fekilde fark edebilirsin:<\/p>\n<ul>\n<li>M\u00fc\u015fterilerden \u201cMailler gitmiyor \/ geri d\u00f6n\u00fcyor\u201d \u015fikayetleri<\/li>\n<li>Mail queue\u2019nun anormal \u015fekilde dolmas\u0131<\/li>\n<li>WHM \u2192 <strong>Mail Delivery Reports<\/strong> ekran\u0131nda hata oranlar\u0131n\u0131n artmas\u0131<\/li>\n<li>IP\u2019nin RBL listelerine d\u00fc\u015fmesi (Spamhaus, Barracuda vb.)<\/li>\n<\/ul>\n<p>\u0130lk kontrol\u00fc genelde WHM \u00fczerinden yapar\u0131z.<\/p>\n<h2>WHM \u00dczerinden Mail Kuyru\u011funu (Mail Queue) Kontrol Etme<\/h2>\n<p>WHM paneline root olarak giri\u015f yap:<\/p>\n<p><code>https:\/\/sunucuip:2087<\/code><\/p>\n<p>Sol men\u00fcden \u015fu yolu izle:<\/p>\n<p><strong>Email \u2192 Mail Queue Manager<\/strong><\/p>\n<p>Burada;<\/p>\n<ul>\n<li>Kuyrukta bekleyen mailleri,<\/li>\n<li>G\u00f6nderici adreslerini (From),<\/li>\n<li>Al\u0131c\u0131 adreslerini (To),<\/li>\n<li>Subject ve tarih bilgilerini<\/li>\n<\/ul>\n<p>g\u00f6rebilirsin.<\/p>\n<h3>Nelere dikkat etmelisin?<\/h3>\n<ul>\n<li>Garip kullan\u0131c\u0131lar: <code>noreply@domain.com<\/code> yerine anlams\u0131z adresler<\/li>\n<li>A\u015f\u0131r\u0131 say\u0131da mail g\u00f6nderen tek bir hesap<\/li>\n<li>\u00c7ok k\u0131sa aral\u0131klarla y\u00fczlerce mail atan kullan\u0131c\u0131<\/li>\n<li>\u00d6zellikle bir domain i\u00e7in yo\u011fun spam trafi\u011fi<\/li>\n<\/ul>\n<p>Buradan genelde hangi <strong>cPanel hesab\u0131n\u0131n<\/strong> spam kayna\u011f\u0131 oldu\u011fu ile ilgili ilk ipucunu al\u0131rs\u0131n.<\/p>\n<h2>Top Mail Relayers (En \u00c7ok Mail G\u00f6nderen Hesaplar)<\/h2>\n<p>WHM\u2019de \u00e7ok i\u015fe yarayan bir di\u011fer ekran:<\/p>\n<p><strong>WHM \u2192 Email \u2192 Mail Statistics \/ View Relayers<\/strong> (veya \u201cView Mail Statistics\u201d \/ \u201cMail Relayers\u201d)<\/p>\n<p>Bu b\u00f6l\u00fcmde:<\/p>\n<ul>\n<li>Hangi cPanel hesab\u0131n\u0131n<\/li>\n<li>Hangi kullan\u0131c\u0131 ad\u0131 ile<\/li>\n<li>Ne kadar mail g\u00f6nderdi\u011fini<\/li>\n<\/ul>\n<p>g\u00f6rebilirsin.<\/p>\n<p>\u00d6rne\u011fin bir kullan\u0131c\u0131n\u0131n son 1 saat i\u00e7inde binlerce mail g\u00f6nderdi\u011fini g\u00f6r\u00fcrsen, b\u00fcy\u00fck ihtimalle spam kayna\u011f\u0131 odur.<\/p>\n<h2>Exim Log Dosyalar\u0131 ile Derin Analiz<\/h2>\n<p>Daha teknik analiz i\u00e7in <strong>Exim loglar\u0131n\u0131<\/strong> incelemek gerekir.<\/p>\n<p>SSH ile sunucuya root olarak ba\u011flan:<\/p>\n<pre><code class=\"language-bash\">ssh root@sunucu-ip\r\n<\/code><\/pre>\n<p>Exim ana log dosyalar\u0131 genellikle:<\/p>\n<pre><code class=\"language-bash\">\/var\/log\/exim_mainlog\r\n\/var\/log\/exim_rejectlog\r\n\/var\/log\/exim_paniclog\r\n<\/code><\/pre>\n<p>dosyalar\u0131ndad\u0131r.<\/p>\n<h3>Belirli bir alan ad\u0131 i\u00e7in arama:<\/h3>\n<pre><code class=\"language-bash\">grep \"domain.com\" \/var\/log\/exim_mainlog | tail\r\n<\/code><\/pre>\n<h3>Belirli bir g\u00f6nderen adresini inceleme:<\/h3>\n<pre><code class=\"language-bash\">grep \"user@domain.com\" \/var\/log\/exim_mainlog | less\r\n<\/code><\/pre>\n<h3>PHP script kaynakl\u0131 g\u00f6nderimler:<\/h3>\n<p>\u00d6zellikle <code>cwd<\/code> sat\u0131rlar\u0131, mailin hangi klas\u00f6rden g\u00f6nderildi\u011fini g\u00f6sterir:<\/p>\n<pre><code class=\"language-bash\">grep \"cwd=\" \/var\/log\/exim_mainlog | grep \"public_html\" | tail\r\n<\/code><\/pre>\n<p>Burada g\u00f6rd\u00fc\u011f\u00fcn path\u2019ler, hangi sitenin \/ scriptin mail g\u00f6nderdi\u011fini anlaman\u0131 sa\u011flar.<\/p>\n<p>\u00d6rne\u011fin:<\/p>\n<pre><code class=\"language-text\">cwd=\/home\/kullanici\/public_html\/wp-content\/themes\/... \r\n<\/code><\/pre>\n<p>gibi bir sat\u0131r, muhtemelen hacklenmi\u015f bir WordPress temas\u0131ndan spam g\u00f6nderildi\u011fi anlam\u0131na gelir.<\/p>\n<h2>cPanel Kullan\u0131c\u0131s\u0131n\u0131 Tespit Etme<\/h2>\n<p>Exim loglar\u0131nda g\u00f6rd\u00fc\u011f\u00fcn dizin yap\u0131s\u0131 genelde \u015f\u00f6yle olur:<\/p>\n<pre><code class=\"language-text\">\/home\/KULLANICI\/public_html\/...\r\n<\/code><\/pre>\n<p>Buradaki <strong>KULLANICI<\/strong>, cPanel hesab\u0131d\u0131r.<br \/>\nDolay\u0131s\u0131yla spam g\u00f6nderenin hangi cPanel hesab\u0131 oldu\u011funu art\u0131k biliyorsun.<\/p>\n<p>Ayr\u0131ca WHM \u2192 <strong>List Accounts<\/strong> ekran\u0131ndan da bu kullan\u0131c\u0131ya ait:<\/p>\n<ul>\n<li>Domain<\/li>\n<li>Disk kullan\u0131m\u0131<\/li>\n<li>Mail \u00f6zellikleri<\/li>\n<\/ul>\n<p>gibi bilgileri kontrol edebilirsin.<\/p>\n<h2>cPanel Hesab\u0131 \u00dczerinde Kontrol Edilmesi Gerekenler<\/h2>\n<p>Spam g\u00f6nderen hesab\u0131 bulduktan sonra \u015fu kontrolleri yapmal\u0131s\u0131n:<\/p>\n<h3>1. E-posta hesaplar\u0131<\/h3>\n<ul>\n<li>Zay\u0131f \u015fifreli mail hesaplar\u0131 hacklenmi\u015f olabilir.<\/li>\n<li>\u015e\u00fcpheli mail adresleri olu\u015fturulmu\u015f olabilir.<br \/>\n\u2192 T\u00fcm mail \u015fifrelerini <strong>g\u00fc\u00e7l\u00fc \u015fifrelerle<\/strong> g\u00fcncelle.<\/li>\n<\/ul>\n<h3>2. Web formlar (PHP mail, contact form vb.)<\/h3>\n<ul>\n<li>Bot korumas\u0131 olmayan formlar \u00fczerinden spam g\u00f6nderilmi\u015f olabilir.<br \/>\n\u2192 reCAPTCHA veya benzeri korumalar ekleyin.<\/li>\n<\/ul>\n<h3>3. CMS g\u00fcvenli\u011fi (WordPress, Joomla, OpenCart)<\/h3>\n<ul>\n<li>G\u00fcncel olmayan WordPress \u00e7ekirde\u011fi, tema veya plugin\u2019ler ciddi g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r.<br \/>\n\u2192 T\u00fcm bile\u015fenleri g\u00fcncelleyin.<br \/>\n\u2192 Zararl\u0131 dosya var m\u0131 diye tarama yap\u0131n (ImunifyAV, maldet vb.)<\/li>\n<\/ul>\n<h3>4. Cron job\u2019lar<\/h3>\n<ul>\n<li>Baz\u0131 cron g\u00f6revleri k\u00f6t\u00fc niyetli scriptleri periyodik \u00e7al\u0131\u015ft\u0131r\u0131yor olabilir.<br \/>\n\u2192 cPanel \u2192 Cron Jobs b\u00f6l\u00fcm\u00fcn\u00fc inceleyin.<\/li>\n<\/ul>\n<h2>Spam Atan Hesaba Ge\u00e7ici Olarak K\u0131s\u0131tlama Getirme<\/h2>\n<p>Spam yay\u0131l\u0131m\u0131 devam etmesin diye cPanel hesab\u0131n\u0131n:<\/p>\n<ul>\n<li>SMTP g\u00f6nderimini s\u0131n\u0131rland\u0131rabilir,<\/li>\n<li>Hesab\u0131 ge\u00e7ici olarak suspend edebilir,<\/li>\n<li>Mail limiti koyabilirsin.<\/li>\n<\/ul>\n<p>WHM \u2192 <strong>Account Functions \u2192 Limit SMTP<\/strong> tarz\u0131 ara\u00e7lar veya <strong>Tweak Settings<\/strong> i\u00e7indeki max hourly emails per domain ayar\u0131 bu i\u015f i\u00e7in kullan\u0131l\u0131r.<\/p>\n<h2>Uzun Vadeli \u00c7\u00f6z\u00fcmler<\/h2>\n<ul>\n<li>Sunucuda <strong>Imunify360 \/ ImunifyAV<\/strong>, <strong>CXS (ConfigServer eXploit Scanner)<\/strong> gibi g\u00fcvenlik ara\u00e7lar\u0131 kullan<\/li>\n<li><strong>CSF + LFD<\/strong> ile brute force giri\u015fimlerini engelle<\/li>\n<li>PHP mail() fonksiyonunu s\u0131n\u0131rlay\u0131p sadece SMTP kullanmaya zorla<\/li>\n<li>Her domain i\u00e7in <strong>SPF, DKIM, DMARC<\/strong> kay\u0131tlar\u0131n\u0131 d\u00fczg\u00fcn ayarla<\/li>\n<li>M\u00fc\u015fterilere g\u00fc\u00e7l\u00fc \u015fifre politikas\u0131 uygula<\/li>\n<\/ul>\n<h2>cPanel \u00dczerinde Spam Mail G\u00f6nderen Hesab\u0131 Tespit Etme &#8211; Sonu\u00e7<\/h2>\n<p><strong>cPanel spam mail g\u00f6nderen hesab\u0131 tespit etme<\/strong> i\u015flemi, ilk bak\u0131\u015fta karma\u015f\u0131k g\u00f6r\u00fcnse de do\u011fru ara\u00e7lar ve y\u00f6ntemlerle olduk\u00e7a y\u00f6netilebilir bir s\u00fcre\u00e7tir.<\/p>\n<p>\u00d6zetle:<\/p>\n<ul>\n<li>WHM\u2019de <strong>Mail Queue<\/strong> ve <strong>Mail Relayers<\/strong> ekran\u0131n\u0131 inceleyerek,<\/li>\n<li>Exim loglar\u0131 \u00fczerinden detayl\u0131 analiz yaparak,<\/li>\n<li><code>cwd<\/code> ve g\u00f6nderici adreslerini takip ederek<\/li>\n<\/ul>\n<p>spam kayna\u011f\u0131 olan <a href=\"https:\/\/www.cpanel.net\/\" target=\"_blank\" rel=\"noopener\">cPanel<\/a> hesab\u0131n\u0131 tespit edebilir ve gerekli \u00f6nlemleri alabilirsin.<\/p>\n<p>Sunucunu ve IP itibar\u0131n\u0131 koruman\u0131n en temel yolu, spam g\u00f6nderen hesab\u0131 h\u0131zl\u0131ca tespit edip izole etmekten ge\u00e7er.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Payla\u015f\u0131ml\u0131 hosting sunucular\u0131nda en s\u0131k kar\u015f\u0131la\u015f\u0131lan problemlerden biri, bir kullan\u0131c\u0131n\u0131n hesab\u0131ndan spam mail g\u00f6nderilmesidir. Bu durum; Sunucu IP\u2019sinin kara listeye (RBL) girmesine, Di\u011fer m\u00fc\u015fterilerin maillerinin de spam klas\u00f6r\u00fcne d\u00fc\u015fmesine, Hizmet kalitesinin ve marka itibar\u0131n\u0131n zedelenmesine neden olur. Bu y\u00fczden bir sunucu y\u00f6neticisi olarak \u201ccpanel-spam-mail-gonderen-hesabi-tespit-etme\u201d konusuna h\u00e2kim olman kritik derecede \u00f6nemlidir. Bu yaz\u0131da, cPanel\/WHM kullanan bir [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-271","post","type-post","status-publish","format-standard","hentry","category-cpanel"],"_links":{"self":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts\/271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":1,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts\/271\/revisions"}],"predecessor-version":[{"id":272,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/posts\/271\/revisions\/272"}],"wp:attachment":[{"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/media?parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/categories?post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adveyer.com\/blog\/wp-json\/wp\/v2\/tags?post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}