Skip to content
Incoming Logs & Query Rules

Incoming Logs & Query Rules

Hunt Through 32 Days of Mail

The Incoming Log Search is your forensics tool—it lets you dig through the past 32 days of messages, quarantined items, and delivery queue entries to find exactly what you’re looking for. Need to find all emails from a sketchy sender? Recover something that got blocked? Find messages that triggered multiple spam filters? Query Rules make it possible.

Getting There

Navigate to Incoming > Logs in your Admin, Domain, or Email level Control Panel.


How Query Rules Work

Query Rules are built on a simple formula—three ingredients:

  1. The Field — What part of the message you’re searching (sender, subject, size, etc.)
  2. The Operator — How to match it (contains, equals, starts with, etc.)
  3. The Value — What you’re actually looking for

For example: Subject contains invoice finds all messages with “invoice” in the subject line.

You can stack multiple rules together using All (every rule must match) or Any (at least one rule matches).


All Query Rule Possibilities and Types

Field CategoryField NameMatch TypesWhat It Does
Message IdentificationMessage ID• Contains
• Equals
• Starts With
• Ends With
• Matches
Find specific messages by their unique ID
Admin• EqualsFilter by admin account
Domain• EqualsFilter by domain name
Filtering Host• EqualsFilter by the server that processed it
Time & DateTimestamp• On
• Before
• After
• Between
• Previous
• Since last run
Search by when the message arrived. Quick shortcuts for Yesterday, Last week, Last month
Sender InfoSender• Contains
• Equals
• Starts With
• Ends With
• Matches
Find messages from specific email addresses
Sender Hostname• Contains
• Equals
• Starts With
• Ends With
• Matches
Search by the sending server’s hostname
Sender IP• Contains
• Equals
• Starts With
• Ends With
• Matches
Find messages from specific IP addresses (useful for blocking botnets)
Sender Location• EqualsFilter by geographic location of sender
RecipientsRecipient• Contains
• Equals
• Starts With
• Ends With
• Matches
Find messages sent to specific addresses
To• Contains
• Equals
• Starts With
• Ends With
• Matches
Search message headers (To field)
CC• Contains
• Equals
• Starts With
• Ends With
• Matches
Search CC’d recipients
Message ContentSubject• Contains
• Equals
• Starts With
• Ends With
• Matches
Search by subject line (great for phishing attempts)
From• Contains
• Equals
• Starts With
• Ends With
• Matches
Search the From header (can differ from envelope sender)
Original Message ID• EqualsFind bounced or forwarded messages by original ID
Message SizeBytes Received• Less Than
• Greater Than
• Equals
Find oversized attachments or tiny spam
Bytes Sent• Less Than
• Greater Than
• Equals
Filter by outgoing data size
ClassificationMain Class• EqualsFilter by main spam classification (Spam, Virus, Malware, etc.)
Sub Class• EqualsNarrow down by subclass (different spam types)
Extra Class• EqualsAdditional classification metadata
Error Class• EqualsFind messages with delivery errors
DeliveryDelivery Date• On
• Before
• After
• Between
When the message was actually delivered
IP• Contains
• Equals
IP address of delivery server
Hostname• Contains
• Equals
Delivery server hostname
Port• EqualsSMTP port used for delivery
Interface• EqualsNetwork interface that received it
Message StatusStatus• EqualsCurrent state (Delivered, Quarantined, In Queue, etc.)

Finding & Acting on Messages

Step 1: Access the Incoming Logs

Go to the Incoming tab on the main dashboard. You’ll see the logs summary and the Query Rules panel.

Step 2: Build Your Query Rules

Click New Rule to add a filter. Select your field, operator, and value. Stack multiple rules as needed.

Step 3: Show Results

Click the blue Show Results button to execute your search across 32 days of mail history.

Step 4: Select Messages

Review the results and check the boxes next to any messages you want to act on.

Step 5: Apply Actions

Select the action you want (Release, Delete, Whitelist, Blacklist, etc.) and click Apply to execute it on the selected messages.


Pro Tips

Finding False Positives: Use Main Class Equals Spam + Sender Equals [email protected] to find emails from trusted senders that got flagged.

Tracking Malware: Search Main Class Equals Virus or Malware to find infected messages by date range. Great for incident response.

Recovering Quarantined Mail: Use Status Equals Quarantined + Recipient Equals [email protected] to find what got blocked for a specific user.

Identifying Spam Campaigns: Search Subject Contains limited time offer to catch common phishing/spam themes across your domain.