Hi,

Below is the source from an email that is clearly spam but the AWL is -1.3 
defeating the spam classification. How can I best adjust the AWL to get this 
classified as SPAM.

Kind regards,
Tom

-- 

Tom Robinson
IT Manager/System Administrator

MoTeC Pty Ltd

121 Merrindale Drive
Croydon South
3136 Victoria
Australia

T: +61 3 9761 5050
F: +61 3 9761 5051   
E: tom.robin...@motec.com.au




Return-Path: <og...@bonnieaugostino.com>
Delivered-To: t...@motec.com.au
Received: (qmail 2934 invoked by alias); 29 Apr 2015 23:02:24 -0000
Delivered-To: fo...@motec.com.au
Received: (qmail 2923 invoked by uid 187); 29 Apr 2015 23:02:24 -0000
Received: from 78.188.129.11.dynamic.ttnet.com.tr by scion.motec.com.au 
(envelope-from <og...@bonnieaugostino.com>, uid 181) with qmail-scanner-2.08st 
 (clamdscan: 0.97.8/20394. spamassassin: 3.3.1. perlscan: 2.08st.  
 Clear:RC:0(78.188.129.11):SA:0(4.6/5.0):. 
 Processed in 14.230659 secs); 29 Apr 2015 23:02:24 -0000
X-Spam-Status: No, hits=4.6 required=5.0
X-Spam-Level: ++++
X-Spam-Report: SA TESTS
  0.7 RCVD_IN_XBL            RBL: Received via a relay in Spamhaus XBL
                             [78.188.129.11 listed in zen.spamhaus.org]
  2.9 HELO_DYNAMIC_SPLIT_IP  Relay HELO'd using suspicious hostname (Split
                             IP)
  0.2 CK_HELO_GENERIC        Relay used name indicative of a Dynamic Pool or
                             Generic rPTR
  0.0 TVD_RCVD_IP            Message was received from an IP address
  1.6 RCVD_IN_BRBL_LASTEXT   RBL: RCVD_IN_BRBL_LASTEXT
                             [78.188.129.11 listed in bb.barracudacentral.org]
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was 
blocked.
                             See
                             
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: world-plants.ru]
  0.4 RDNS_DYNAMIC           Delivered to internal network by host with
                             dynamic-looking rDNS
 -1.3 AWL                    AWL: Adjusted score from AWL reputation of From: 
address
Received: from 78.188.129.11.dynamic.ttnet.com.tr (78.188.129.11)
  by scion.motec.com.au with SMTP; 29 Apr 2015 23:02:09 -0000
Message-ID: <fn4sakwr.2943...@bonnieaugostino.com>
Date: Thu, 30 Apr 2015 01:48:15 +0200
From: "American Express" <fr...@americanexpress.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 
Thunderbird/24.2.0
MIME-Version: 1.0
To: <emailpete.swin...@motec.com.au>
Subject: Irregular card activity
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Irregular check card activity
American Express
                        
Dear Customer,
We detected irregular card activity on your American Express Check Card on 29 
April, 2015.

As the Primary Contact, you must verify your credit card activity before you 
can continue using your card, and upon verification, we will remove any 
restrictions placed on your card.

To review your account as soon as possible please click on the link below.

http://world-plants.ru/foldername/index.html

Thank you for your Card Membership.


-------------
American Express Customer Care
                  
Fraud Department:
Erica Bermudez
Level III Security Officer


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to