Spam detection software, running on the system "freenetproject.org",
has identified this incoming email as possible spam.  The original
message has been attached to this so you can view it or label
similar future email.  If you have any questions, see
the administrator of that system for details.

Content preview:  [...] 

Content analysis details:   (29.0 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 3.5 BAYES_99               BODY: Bayes spam probability is 99 to 100%
                            [score: 1.0000]
-0.0 FREENET_FROM           No description available.
 2.0 FREENET_FROM_BACKUPMX  Received from the backup-MX server
 0.0 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname
                            (Split IP)
 0.2 CK_HELO_GENERIC        Relay used name indicative of a Dynamic Pool or
                            Generic rPTR
 2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
                            [27.105.243.34 listed in psbl.surriel.com]
 1.3 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
               [Blocked - see <http://www.spamcop.net/bl.shtml?27.105.243.34>]
 0.4 RCVD_IN_XBL            RBL: Received via a relay in Spamhaus XBL
                            [27.105.243.34 listed in zen.spamhaus.org]
 3.3 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
 1.4 RCVD_IN_BRBL_LASTEXT   RBL: No description available.
                            [27.105.243.34 listed in bb.barracudacentral.org]
 0.7 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)
 0.1 FREENET_APP_ATTACHED   BODY: email contains an application attachment
 0.4 MIME_HTML_MOSTLY       BODY: Multipart message mostly text/html MIME
 0.0 HTML_MESSAGE           BODY: HTML included in message
 4.0 BAYES_999              BODY: Bayes spam probability is 99.9 to 100%
                            [score: 1.0000]
 0.0 TVD_SPACE_RATIO        No description available.
 0.8 RDNS_NONE              Delivered to internal network by a host with no rDNS
 4.5 FREENET_MALWARE        We're unlikely to send compressed attachments from
                            our backupmx... or to receive them to an
                            RFC-reserved address
 3.6 HELO_DYNAMIC_IPADDR2   Relay HELO'd using suspicious hostname (IP addr
                            2)

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam.  If you wish to view
it, it may be safer to save it to a file and open it with an editor.

-------------- next part --------------
An embedded message was scrubbed...
From: "Ruth" <[email protected]>
Subject: Emailing: Image93.jpg
Date: Wed, 24 Aug 2016 23:31:43 +0800
Size: 8394
URL: 
<https://emu.freenetproject.org/pipermail/thaw/attachments/20160824/20a224d5/attachment.mht>

Reply via email to