Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Return-path: <sylvain.perrot@crieppam.fr>
- Envelope-to: sylvain.perrot@crieppam.fr
- Delivery-date: Sun, 04 Nov 2018 16:11:33 +0100
- Received: from [188.187.27.138] (port=34915 helo=188x187x27x138.dynamic.spb.ertelecom.ru)
- by dolphin.o2switch.net with esmtp (Exim 4.91)
- (envelope-from <sylvain.perrot@crieppam.fr>)
- id 1gJK3m-00CiKU-Oy
- for sylvain.perrot@crieppam.fr; Sun, 04 Nov 2018 16:11:33 +0100
- Message-ID: <47BBE4113A184ECF336C99B290C647BB@P5C27M2Y>
- From: <sylvain.perrot@crieppam.fr>
- To: "oisljxmn" <sylvain.perrot@crieppam.fr>
- Date: 4 Nov 2018 19:55:49 +0200
- MIME-Version: 1.0
- Content-Type: text/plain;
- charset="ibm852"
- Content-Transfer-Encoding: 8bit
- X-Priority: 3
- X-MSMail-Priority: Normal
- X-Mailer: Microsoft Outlook Express 6.00.2900.2180
- X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
- X-Spam-Status: Yes, score=23.6
- X-Spam-Score: 236
- X-Spam-Bar: +++++++++++++++++++++++
- X-Spam-Report: ------------------ Début de Rapport SpamAssassin ---------------------
- Ce message est probablement du SPAM (message non sollicité envoyé en
- masse, publicité, escroquerie...).
- Détails de l'analyse du message: (23.6 points, 5.0 requis)
- 1.5 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname (Split IP)
- 0.2 CK_HELO_GENERIC Relay used name indicative of a Dynamic Pool or Generic rPTR
- 3.6 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL [188.187.27.138 listed in zen.spamhaus.org]
- 0.7 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL
- 1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL, [188.187.27.138 listed in bl.score.senderscore.com]
- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked.
- 1.3 RDNS_NONE Delivered to internal network by a host with no rDNS
- 3.9 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP addr 2)
- 2.8 HDR_ORDER_FTSDMCXX_NORDNS Header order similar to spam (FTSDMCXX/boundary variant) + no rDNS
- 2.0 HDR_ORDER_FTSDMCXX_DIRECT Header order similar to spam (FTSDMCXX/boundary variant) + direct-to-MX
- 0.8 MIMEOLE_DIRECT_TO_MX MIMEOLE + direct-to-MX
- 3.1 DOS_OE_TO_MX Delivered direct to MX with OE headers
- 2.5 NO_FM_NAME_IP_HOSTN No From name + hostname using IP address
- -------------------- Fin de Rapport SpamAssassin ---------------------
- X-Spam-Flag: YES
- Subject: ***Potentiel-SPAM*** Change your password oisljxmn immediately. Your account has been hacked.
- X-EsetId: 37303A29EE5AEA6267726A
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement