Spam detection software, running on the system "futureinternet", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details. Content preview: Snag a flying 300% on B Y S D! Reasonable at just $.01! Presently a fragment of a penny. Determined to make noise! Allocate your bid on Tue, May 28th. [...] Content analysis details: (18.4 points, 4.5 required) pts rule name description ---- ---------------------- -------------------------------------------------- 3.3 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL [178.125.106.242 listed in zen.spamhaus.org] 0.4 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL 0.8 RCVD_IN_SORBS_WEB RBL: SORBS: sender is an abusable web server [178.125.106.242 listed in dnsbl.sorbs.net] 1.4 RCVD_IN_BRBL_LASTEXT RBL: RCVD_IN_BRBL_LASTEXT [178.125.106.242 listed in bb.barracudacentral.org] 2.3 FSL_HELO_BARE_IP_1 FSL_HELO_BARE_IP_1 3.4 RCVD_ILLEGAL_IP Received: contains illegal IP address 1.6 TVD_RCVD_IP4 TVD_RCVD_IP4 0.7 TVD_RCVD_IP TVD_RCVD_IP 1.2 RCVD_NUMERIC_HELO Received: contains an IP address used for HELO 2.0 BAYES_80 BODY: Bayes spam probability is 80 to 95% [score: 0.9318] 0.5 MISSING_MID Missing Message-Id: header 0.8 RDNS_NONE Delivered to internal network by a host with no rDNS -------------- next part -------------- An embedded message was scrubbed... From: valentin at intermoda.ru Subject: It has a history of Huge Rallies, on verge of another Rally? Date: Sun, 26 May 2013 09:16:31 +0300 Size: 835 URL: <https://lists.fiware.org/private/fiware-opencall-help/attachments/20130526/9dc2c949/attachment.mht>
You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy Cookies policy