Advertisement
Guest User

correct req spam

a guest
Apr 22nd, 2013
412
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.75 KB | None | 0 0
  1. Content type: Spam
  2. Internal reference code for the message is 05414-04/FK5sohOaI9rP
  3.  
  4. First upstream SMTP client IP address: [93.45.85.48]
  5. 93-45-85-48.ip101.fastwebnet.it
  6. According to a 'Received:' trace, the message apparently originated at:
  7. [93.45.85.48], 93-45-85-48.ip101.fastwebnet.it
  8. 93-45-85-48.ip101.fastwebnet.it [93.45.85.48]
  9.  
  10. Return-Path: <8ADBAEC62@armir74.ru>
  11. From: "Vip.Dating Network" <8ADBAEC62@armir74.ru>
  12. Message-ID:
  13. <20130423025758.542A7890F8C1F56521C9B.B840C89@93-45-85-48.ip101.fastwebnet.it>
  14. Subject: You've got new mails
  15. The message has been quarantined as: spam@domain**
  16.  
  17. The message WAS NOT relayed to:
  18. <user@domain**>:
  19. 250 2.7.0 Ok, discarded, id=05414-04 - SPAM
  20.  
  21. SpamAssassin report:
  22. Spam detection software, running on the system "wakawaka.domain**", has
  23. identified this incoming email as possible spam. The original message
  24. has been attached to this so you can view it (if it isn't spam) or label
  25. similar future email. If you have any questions, see
  26. the administrator of that system for details.
  27.  
  28. Content preview: Welcome letter Dear user, Enjoy 72 Hours FREE! [...]
  29.  
  30. Content analysis details: (21.0 points, 5.0 required)
  31.  
  32. pts rule name description
  33. ---- ---------------------- --------------------------------------------------
  34. 3.2 FH_HELO_EQ_D_D_D_D Helo is d-d-d-d
  35. 0.0 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname
  36. (Split IP)
  37. 0.0 TVD_RCVD_IP TVD_RCVD_IP
  38. 1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL,
  39. https://senderscore.org/blacklistlookup/
  40. [93.45.85.48 listed in bl.score.senderscore.com]
  41. 3.3 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL
  42. [93.45.85.48 listed in zen.spamhaus.org]
  43. 0.4 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL
  44. 1.3 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
  45. [Blocked - see <http://www.spamcop.net/bl.shtml?93.45.85.48>]
  46. 2.7 RCVD_IN_PSBL RBL: Received via a relay in PSBL
  47. [93.45.85.48 listed in psbl.surriel.com]
  48. 1.4 RCVD_IN_BRBL_LASTEXT RBL: RCVD_IN_BRBL_LASTEXT
  49. [93.45.85.48 listed in bb.barracudacentral.org]
  50. 2.0 BAYES_80 BODY: Bayes spam probability is 80 to 95%
  51. [score: 0.8484]
  52. 0.0 HTML_MESSAGE BODY: HTML included in message
  53. 0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
  54. 1.0 RDNS_DYNAMIC Delivered to internal network by host with
  55. dynamic-looking rDNS
  56. 3.6 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP addr
  57. 2)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement