From: Василий <gullibilityo6@royalhawaii.com>
Date: Tue, 29 Nov 2011 00:22:31 +0800
Subject: ****SPAM**** курс: Профессиональное финансовое. планиро

Spam detection software, running on the system "s15340946.onlinehome-server.info", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
postmaster for details.

Content preview: Методы которые предпочли уже 6000 предприятий. Спецподготовка
за 5 дней чистой практики 19-23 декабря 2011г. [...]

Content analysis details: (65.6 points, 7.0 required)

pts rule name description
---- ---------------------- --------------------------------------------------
4.4 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP addr
2)
0.5 FH_HELO_EQ_D_D_D_D Helo is d-d-d-d
0.0 HTML_MESSAGE BODY: HTML included in message
1.8 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars
21 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see ]
1.6 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP address
[118.169.38.110 listed in dnsbl.sorbs.net]
2.5 DNS_FROM_RFC_DSN RBL: Envelope sender in dsn.rfc-ignorant.org
2.1 DNS_FROM_RFC_BOGUSMX RBL: Envelope sender in bogusmx.rfc-ignorant.org
31 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL
[118.169.38.110 listed in zen.spamhaus.org]
0.5 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL
0.1 RDNS_NONE Delivered to trusted network by a host with no rDNS

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.


<
27645/35031
>
© 2009 - 2021 megahaus.eu