This can be vital in tracking down the source of not only an offending subscription but possibly a compromised email address or if the source is from a script, listing the file that generated the email in the first place.
It may be sufficient to log the headers rather than the actual email content... Or possibly just a truncated portion of the offending emails content? As long as the source (email address/script) is logged it should be sufficient to help track down security breaches and injected malware code...
This can be vital in tracking down the source of not only an offending subscription but possibly a compromised email address or if the source is from a script, listing the file that generated the email in the first place.
It may be sufficient to log the headers rather than the actual email content... Or possibly just a truncated portion of the offending emails content? As long as the source (email address/script) is logged it should be sufficient to help track down security breaches and injected malware code...