Return-Path: <[email protected]> Delivered-To: [email protected] Received: from server.eklavya.in by server.eklavya.in with LMTP id SqIaLw5cj12PXQAAviDrCw (envelope-from <[email protected]>) for <[email protected]>; Sat, 28 Sep 2019 13:11:42 +0000 Return-path: <[email protected]> Envelope-to: [email protected] Delivery-date: Sat, 28 Sep 2019 13:11:42 +0000 Received: from [60.167.134.158] (port=62340 helo=hotmail.com) by server.eklavya.in with esmtp (Exim 4.92) (envelope-from <[email protected]>) id 1iECVf-0006E0-IB for [email protected]; Sat, 28 Sep 2019 13:11:42 +0000 From: [email protected] To: [email protected] Content-Type: text/plain;charset="GB2312" Content-Transfer-Encoding: 8bit Date: Sat, 28 Sep 2019 21:11:25 +0800 X-Priority: 3 X-Mailer: Microsoft Outlook Express 5.00.2919.6700 X-Spam-Status: Yes, score=25.5 X-Spam-Score: 255 X-Spam-Bar: +++++++++++++++++++++++++ X-Spam-Report: Spam detection software, running on the system "server.eklavya.in", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see root\@localhost for details. Content preview: ������棨��Ʊ������֤���ٸ�� �绰��13764318853 ���� �ţ����ֻ�ͬ�ţ� Content analysis details: (25.5 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 FSL_HELO_FAKE No description available. 1.5 SPF_HELO_SOFTFAIL SPF: HELO does not match SPF record (softfail) 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (baoguan[at]hotmail.com) 1.5 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) 1.3 RCVD_IN_RP_RNBL RBL: Relay in RNBL, https://senderscore.org/blacklistlookup/ [60.167.134.158 listed in bl.score.senderscore.com] 1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see <https://www.spamcop.net/bl.shtml?60.167.134.158>] 2.7 RCVD_IN_PSBL RBL: Received via a relay in PSBL [60.167.134.158 listed in psbl.surriel.com] 2.0 RDNS_NONE Delivered to internal network by a host with no rDNS 0.0 PDS_HP_HELO_NORDNS High profile HELO with no sender rDNS 2.4 TVD_SPACE_ENCODED Space ratio & encoded subject 0.0 SPOOFED_FREEMAIL_NO_RDNS From SPOOFED_FREEMAIL and no rDNS 2.0 SPOOFED_FREEMAIL No description available. 3.1 DOS_OE_TO_MX Delivered direct to MX with OE headers 2.5 TO_NO_BRKTS_MSFT To: lacks brackets and supposed Microsoft tool 2.5 TVD_SPACE_RATIO_MINFP Space ratio 2.8 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook X-Spam-Flag: YES Subject: ***SPAM*** =?GB2312?B?saPV5reixrGjrNDo0qrBqs+1?= ������棨��Ʊ������֤���ٸ�� �绰��13764318853 ���� �ţ����ֻ�ͬ�ţ�