In this article we'll go over how you can find the number of times BoxTrapper is running for your users on your VPS or dedicated server.

Using BoxTrapper can be a good way to help limit the amount of spam you receive on an account. However in some cases it can also lead to elevated server usage if one particular user on your server is getting heavily spammed from a wide variety of email addresses.

If you've read my article on advanced server load monitoring and see that your server's load is spiking, or if you setup a server load monitoring bash script to alert you via email during load spikes, BoxTrapper could be a possible culprit of these issues that you might want to look into.

To find the number of times BoxTrapper is running you'll need root access to your VPS or dedicated server, so that you have access to the Exim mail logs.

Find users with the most BoxTrapper deliveries

  1. Login to your server via SSH as the root user.
  2. Run the following command:

    grep "T=virtual_boxtrapper_userdelivery" /var/log/exim_mainlog | awk '{print $6}' | sort | uniq -c | sort -n

    Code breakdown:

    grep "T=virtual_boxtrapper_userdelivery" /var/log/exim_mainlog Locate mentions of T=virtual_boxtrapper_userdelivery in the Exim mail log.
    awk '{print $6}' Use the awk command to print the $6th column of data which is the email address the BoxTrapper message was delivered to.
    sort | uniq -c | sort -n Sort that data by user, then uniquely count it, and finally sort it from lowest to highest occurences.

    You should get back something like:

    331 <info@example.com>
    367 <support@example.com>
    422 <test@example.com>
    3243 <user@example.com>

    Now we know that the user@example.com user has had BoxTrapper manage at least 3,243 emails.

You should now be able to to figure out which users on your server have an excessive amount of BoxTrapper verfications being used. If you've been having issues with your server's load you might want to consider disabling BoxTrapper for these users and have them seek alternative methods for reducing spam.

Did you find this article helpful?

We value your feedback!

Why was this article not helpful? (Check all that apply)
The article is too difficult or too technical to follow.
There is a step or detail missing from the instructions.
The information is incorrect or out-of-date.
It does not resolve the question/problem I have.
How did you find this article?
Please tell us how we can improve this article:
Email Address
Name

new! - Enter your name and email address above and we will post your feedback in the comments on this page!

Like this Article?

Post a Comment

Name:
Email Address:
Phone Number:
Comment:
Submit

Please note: Your name and comment will be displayed, but we will not show your email address.

News / Announcements

WordPress wp-login.php brute force attack
Updated 2014-07-17 06:43 pm EST
Hits: 200999

Related Questions

Here are a few questions related to this article that our customers have asked:
Ooops! It looks like there are no questions about this page.
Would you like to ask a question about this page? If so, click the button below!
Ask a Question

Need more Help?

Search

Ask the Community!

Get help with your questions from our community of like-minded hosting users and InMotion Hosting Staff.

Current Customers

Chat: Click to Chat Now E-mail: support@InMotionHosting.com
Call: 888-321-HOST (4678) Ticket: Submit a Support Ticket

Not a Customer?

Get web hosting from a company that is here to help. Sign up today!