spoonbill.riseup.net
X-Spam-Flag: YES
X-Spam-Level: ******
X-Spam-Report:
* 1.3 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
* [Blocked - see http://www.spamcop.net/bl.shtml?202.71.110.21]
* -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no
* trust
* [209.141.47.85 listed in list.dnswl.org]
* 0.1 CAPS_TO Being sent to address with mixed case
* 0.0 FORWARD_RELAY Appears to be relayed through list or forwarding
* 0.3 NOMATCH_NICK_FROM From address with no part of name
* 1.6 FORGED_YAHOO_RCVD 'From' yahoo.com does not match 'Received' headers
* 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
* (serrahwolf[at]yahoo.com)
* 0.0 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail
* domains are different
* -0.0 SPF_PASS SPF: sender matches SPF record
* -0.0 SPF_HELO_PASS SPF: HELO matches SPF record
* 0.0 ENV_FROM_DIFF0 Envelope From differs from from (eg list)
* 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is
* CUSTOM_MED
* 0.1 LOWERCASE_I BODY: Symptom of Markov spampoem, or lazy writer
* 2.6 DEAR_FRIEND BODY: Dear Friend? That's not very dear!
* -0.0 BAYES_40 BODY: Bayes spam probability is 20 to 40%
* [score: 0.3051]
* 0.0 HTML_MESSAGE BODY: HTML included in message
* 0.1 HTML_STYLE_EMPTY RAW: Empty style tag (to hide text?)
* 0.1 LINK_NR_TOP RAW: Short message with link near top
* 0.1 CK_KARD_SIZE short, card virus size - avoid matches in long text
* 0.0 CK_419SIZE typical 419 size - avoid matches in long text
* 0.0 FREEMAIL_FORGED_FROMDOMAIN 2nd level domains in From and
* EnvelopeFrom freemail headers are different
* -0.1 AM_TRUNCATED Compensate on large message for misfiring rules
X-Spam-Pyzor: Reported 0 times.
X-Spam-Status: Yes, score=6.1 required=5.0
tests=AM_TRUNCATED,BAYES_40,CAPS_TO,
CK_419SIZE,CK_KARD_SIZE,DEAR_FRIEND,DKIM_ADSP_CUSTOM_MED,ENV_FROM_DIFF0,
FORGED_YAHOO_RCVD,FORWARD_RELAY,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM,
HEADER_FROM_DIFFERENT_DOMAINS,HTML_MESSAGE,HTML_STYLE_EMPTY,LINK_NR_TOP,
LOWERCASE_I,NOMATCH_NICK_FROM,RCVD_IN_BL_SPAMCOP_NET,RCVD_IN_DNSWL_NONE,
SPF_HELO_PASS,SPF_PASS shortcircuit=no autolearn=disabled version=3.4.0
Delivered-To: rayzer@riseup.net
Received: from mx1.riseup.net (unknown [10.0.1.33])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client CN "*.riseup.net", Issuer "COMODO RSA Domain Validation Secure
Server CA" (verified OK))
by spoonbill.riseup.net (Postfix) with ESMTPS id AF665C8;
Fri, 12 Aug 2016 05:08:59 +0000 (UTC)
Received: from antiproton.jfet.org (antiproton.jfet.org [209.141.47.85])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client CN "mail.jfet.org", Issuer "StartCom Class 1 DV Server CA" (not
verified))
by mx1.riseup.net (Postfix) with ESMTPS id 04B4B1A19C9;
Fri, 12 Aug 2016 05:08:57 +0000 (UTC)
Received: from antiproton.jfet.org (localhost.localdomain [127.0.0.1])
by antiproton.jfet.org (8.14.4/8.14.4/Debian-8) with ESMTP id
u7C4s9lq017823;
Fri, 12 Aug 2016 00:54:09 -0400
Received: from server30 (ptr.opteron-server.net [202.71.110.21] (may be
forged))
by antiproton.jfet.org (8.14.4/8.14.4/Debian-8) with ESMTP id
u7C4rOXd017798
(version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256
verify=NOT)
for
participants (1)
-
None