Look carefully at these:
sender: [email protected]
named_attribute: log_client_name=localhost.localdomain
named_attribute: log_client_address=127.0.0.1
named_attribute: log_client_port=40070
named_attribute: log_message_origin=localhost.localdomain[127.0.0.1]
named_attribute: log_helo_name=localhost
named_attribute: log_protocol_name=ESMTP
named_attribute: helo_name=localhost
This means, some process from localhost
(i.e. the server machine itself) made a ESMTP transaction to this server. It began with EHLO localhost
and then, without any authentication, it was accepted for delivery. I can guess you have 127.0.0.1
in mynetworks
. The "Received" header it added has the same information (that's no wonder).
That's all Postfix had seen and could tell you. Seek the answer to "who is the real sender" in some other place. That might be web mail, so read webserver access logs; that might be server is compromised (oh!) or just there is some hole in PHP script which allows to send a mail. Check wtmp (last
and so on). Look for logs near Thu, 24 Jun 2021 06:44:46 -0400 (EDT).
I'll reiterate this for you to not ask the same question in another words: Postfix was done all it could to disclose you where it got this mail. The only thing it knows that mail came from localhost. That rings the bell: "check your localhost" (the server).