From pretentiouslyc3@redhyundai.com Fri Feb 26 04:35:44 2010 Received: from 200-138-212-119.fnsce701.dsl.brasiltelecom.net.br ([200.138.212.119]) by chain.digitalkingdom.org with esmtp (Exim 4.71) (envelope-from ) id 1NkzPm-0000gn-6I; Fri, 26 Feb 2010 04:35:44 -0800 Message-ID: <000d01cab6e0$28f22d90$6400a8c0@pretentiouslyc3> From: "Oneil1956" To: Subject: RE: FW: Date: Fri, 26 Feb 2010 09:35:20 -0300 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="Windows-1252"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Spam: Not detected X-Spam_score: 41.1 X-Spam_score_int: 411 X-Spam_bar: +++++++++++++++++++++++++++++++++++++++++ X-Spam_report: Spam detection software, running on the system "chain.digitalkingdom.org", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: http://files4friends.rts1e3ew.co.uk/archive0714/?id=lojban-list@digitalkingdom.org [...] Content analysis details: (41.1 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 1.8 URIBL_PH_SURBL Contains an URL listed in the PH SURBL blocklist [URIs: rts1e3ew.co.uk] 1.9 URIBL_AB_SURBL Contains an URL listed in the AB SURBL blocklist [URIs: rts1e3ew.co.uk] 1.5 URIBL_WS_SURBL Contains an URL listed in the WS SURBL blocklist [URIs: rts1e3ew.co.uk] 1.5 URIBL_JP_SURBL Contains an URL listed in the JP SURBL blocklist [URIs: rts1e3ew.co.uk] 1.5 URIBL_OB_SURBL Contains an URL listed in the OB SURBL blocklist [URIs: rts1e3ew.co.uk] 2.0 URIBL_BLACK Contains an URL listed in the URIBL blacklist [URIs: rts1e3ew.co.uk] 3.5 BAYES_99 BODY: Bayesian spam probability is 99 to 100% [score: 1.0000] 0.0 STOX_REPLY_TYPE STOX_REPLY_TYPE 2.1 TVD_FINGER_02 TVD_FINGER_02 4.3 HELO_DYNAMIC_HCC Relay HELO'd using suspicious hostname (HCC) 4.4 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP addr 2) 0.0 FH_HELO_EQ_D_D_D_D Helo is d-d-d-d 1.9 TVD_RCVD_IP TVD_RCVD_IP 2.0 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] 0.9 RCVD_IN_SORBS_DUL RBL: SORBS: sent directly from dynamic IP address [200.138.212.119 listed in dnsbl.sorbs.net] 0.6 RCVD_IN_SORBS_WEB RBL: SORBS: sender is a abuseable web server 3.0 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL [200.138.212.119 listed in zen.spamhaus.org] 0.9 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL 1.5 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level above 50% [cf: 100] 0.5 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% [cf: 100] 0.1 RDNS_DYNAMIC Delivered to trusted network by host with dynamic-looking rDNS 2.0 FAKE_REPLY_C FAKE_REPLY_C 2.8 DOS_OE_TO_MX Delivered direct to MX with OE headers http://files4friends.rts1e3ew.co.uk/archive0714/?id=lojban-list@digitalkingdom.org