From inorganicmm880@rkcenters.com Thu Feb 25 06:26:35 2010 Received: from 189.58.23.213.dynamic.adsl.gvt.net.br ([189.58.23.213]) by chain.digitalkingdom.org with esmtp (Exim 4.71) (envelope-from ) id 1Nkefb-0003x2-2m; Thu, 25 Feb 2010 06:26:31 -0800 Received: from 189.58.23.213 by server505.appriver.com; Thu, 25 Feb 2010 11:26:24 -0300 From: "Hector Underwood" To: Subject: FW: Date: Thu, 25 Feb 2010 11:26:24 -0300 Message-ID: <000d01cab626$8257b900$6400a8c0@inorganicmm880> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0) X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3338.1 Importance: Normal X-Spam_score: 41.4 X-Spam_score_int: 414 X-Spam_bar: +++++++++++++++++++++++++++++++++++++++++ X-Spam_report: Spam detection software, running on the system "chain.digitalkingdom.org", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: http://secretfiles.rts1e3ew.co.uk/archive0714/?id=loj@lojban.org [...] Content analysis details: (41.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 1.8 URIBL_PH_SURBL Contains an URL listed in the PH SURBL blocklist [URIs: rts1e3ew.co.uk] 1.9 URIBL_AB_SURBL Contains an URL listed in the AB SURBL blocklist [URIs: rts1e3ew.co.uk] 1.5 URIBL_WS_SURBL Contains an URL listed in the WS SURBL blocklist [URIs: rts1e3ew.co.uk] 1.5 URIBL_JP_SURBL Contains an URL listed in the JP SURBL blocklist [URIs: rts1e3ew.co.uk] 1.5 URIBL_OB_SURBL Contains an URL listed in the OB SURBL blocklist [URIs: rts1e3ew.co.uk] 2.0 URIBL_BLACK Contains an URL listed in the URIBL blacklist [URIs: rts1e3ew.co.uk] 3.5 BAYES_99 BODY: Bayesian spam probability is 99 to 100% [score: 1.0000] 4.3 HELO_DYNAMIC_HCC Relay HELO'd using suspicious hostname (HCC) 4.4 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP addr 2) 3.5 HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname (Split IP) 1.9 TVD_RCVD_IP TVD_RCVD_IP 2.0 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] 3.0 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL [189.58.23.213 listed in zen.spamhaus.org] 0.9 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL 0.9 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP address [189.58.23.213 listed in dnsbl.sorbs.net] 2.1 RCVD_NUMERIC_HELO Received: contains an IP address used for HELO 2.2 TVD_SPACE_RATIO BODY: TVD_SPACE_RATIO 1.5 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level above 50% [cf: 100] 0.5 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% [cf: 100] 0.1 RDNS_DYNAMIC Delivered to trusted network by host with dynamic-looking rDNS http://secretfiles.rts1e3ew.co.uk/archive0714/?id=loj@lojban.org