SHARE
TWEET

correct req spam

a guest Apr 22nd, 2013 106 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Content type: Spam
  2. Internal reference code for the message is 05414-04/FK5sohOaI9rP
  3.  
  4. First upstream SMTP client IP address: [93.45.85.48]
  5.   93-45-85-48.ip101.fastwebnet.it
  6. According to a 'Received:' trace, the message apparently originated at:
  7.   [93.45.85.48], 93-45-85-48.ip101.fastwebnet.it
  8.   93-45-85-48.ip101.fastwebnet.it [93.45.85.48]
  9.  
  10. Return-Path: <8ADBAEC62@armir74.ru>
  11. From: "Vip.Dating Network" <8ADBAEC62@armir74.ru>
  12. Message-ID:
  13.   <20130423025758.542A7890F8C1F56521C9B.B840C89@93-45-85-48.ip101.fastwebnet.it>
  14. Subject: You've got new mails
  15. The message has been quarantined as: spam@domain**
  16.  
  17. The message WAS NOT relayed to:
  18. <user@domain**>:
  19.    250 2.7.0 Ok, discarded, id=05414-04 - SPAM
  20.  
  21. SpamAssassin report:
  22. Spam detection software, running on the system "wakawaka.domain**", has
  23. identified this incoming email as possible spam.  The original message
  24. has been attached to this so you can view it (if it isn't spam) or label
  25. similar future email.  If you have any questions, see
  26. the administrator of that system for details.
  27.  
  28. Content preview:  Welcome letter Dear user, Enjoy 72 Hours FREE! [...]
  29.  
  30. Content analysis details:   (21.0 points, 5.0 required)
  31.  
  32.  pts rule name              description
  33. ---- ---------------------- --------------------------------------------------
  34.  3.2 FH_HELO_EQ_D_D_D_D     Helo is d-d-d-d
  35.  0.0 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname
  36.                             (Split IP)
  37.  0.0 TVD_RCVD_IP            TVD_RCVD_IP
  38.  1.3 RCVD_IN_RP_RNBL        RBL: Relay in RNBL,
  39.                             https://senderscore.org/blacklistlookup/
  40.                             [93.45.85.48 listed in bl.score.senderscore.com]
  41.  3.3 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
  42.                             [93.45.85.48 listed in zen.spamhaus.org]
  43.  0.4 RCVD_IN_XBL            RBL: Received via a relay in Spamhaus XBL
  44.  1.3 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
  45.                  [Blocked - see <http://www.spamcop.net/bl.shtml?93.45.85.48>]
  46.  2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
  47.                             [93.45.85.48 listed in psbl.surriel.com]
  48.  1.4 RCVD_IN_BRBL_LASTEXT   RBL: RCVD_IN_BRBL_LASTEXT
  49.                             [93.45.85.48 listed in bb.barracudacentral.org]
  50.  2.0 BAYES_80               BODY: Bayes spam probability is 80 to 95%
  51.                             [score: 0.8484]
  52.  0.0 HTML_MESSAGE           BODY: HTML included in message
  53.  0.7 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
  54.  1.0 RDNS_DYNAMIC           Delivered to internal network by host with
  55.                             dynamic-looking rDNS
  56.  3.6 HELO_DYNAMIC_IPADDR2   Relay HELO'd using suspicious hostname (IP addr
  57.                             2)
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top