Hi
Why does pmg forward this mail to me?
The default rule "Block Spam (Level 10)" is set to block mail above Spam level 10.
Br. Peter
-----Forwarded Spam mail-----
Spam detection software, running on the system "pmg.server.local",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: Hej! Jeg har meget dårlige nyheder for dig. 17/11/2018
- På denne dag hackede jeg dit operativsystem og fik fuld adgang til
din konto xxxxx@xxxxx.xxx. Du kan tjekke det - jeg sendte denne [...]
Content analysis details: (26.0 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
1.4 RCVD_IN_NIX_SPAM RBL: Listed in NiX Spam DNSBL (heise.de)
[37.231.250.113 listed in ix.dnsbl.manitu.net]
-0.0 BAYES_20 BODY: Bayes spam probability is 5 to 20%
[score: 0.1389]
3.3 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL
[37.231.250.113 listed in zen.spamhaus.org]
0.0 SPF_NONE SPF: sender does not publish an SPF Record
0.0 HTML_MESSAGE BODY: HTML included in message
1.4 DCC_REPUT_99_100 DCC reputation between 99 % or higher (spam)
1.1 DCC_CHECK Detected as bulk mail by DCC (dcc-servers.net)
1.0 KAM_HTMLNOISE Spam containing useless HTML padding
1.0 ZMIde_OutlookExpress Outlook Express should not be used anymore
0.8 RDNS_NONE Delivered to internal network by a host with no rDNS
3.5 HDR_ORDER_FTSDMCXX_NORDNS Header order similar to spam
(FTSDMCXX/boundary variant) + no rDNS
1.0 KAM_LAZY_DOMAIN_SECURITY Sending domain does not have any
anti-forgery methods
0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe
2.0 HDR_ORDER_FTSDMCXX_DIRECT Header order similar to spam
(FTSDMCXX/boundary variant) + direct-to-MX
1.2 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
2.0 MIMEOLE_DIRECT_TO_MX MIMEOLE + direct-to-MX
3.5 BITCOIN_SPAM_07 BitCoin spam pattern 07
2.5 DOS_OE_TO_MX Delivered direct to MX with OE headers
0.2 HELO_MISC_IP Looking for more Dynamic IP Relays
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.
Why does pmg forward this mail to me?
The default rule "Block Spam (Level 10)" is set to block mail above Spam level 10.
Br. Peter
-----Forwarded Spam mail-----
Spam detection software, running on the system "pmg.server.local",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: Hej! Jeg har meget dårlige nyheder for dig. 17/11/2018
- På denne dag hackede jeg dit operativsystem og fik fuld adgang til
din konto xxxxx@xxxxx.xxx. Du kan tjekke det - jeg sendte denne [...]
Content analysis details: (26.0 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
1.4 RCVD_IN_NIX_SPAM RBL: Listed in NiX Spam DNSBL (heise.de)
[37.231.250.113 listed in ix.dnsbl.manitu.net]
-0.0 BAYES_20 BODY: Bayes spam probability is 5 to 20%
[score: 0.1389]
3.3 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL
[37.231.250.113 listed in zen.spamhaus.org]
0.0 SPF_NONE SPF: sender does not publish an SPF Record
0.0 HTML_MESSAGE BODY: HTML included in message
1.4 DCC_REPUT_99_100 DCC reputation between 99 % or higher (spam)
1.1 DCC_CHECK Detected as bulk mail by DCC (dcc-servers.net)
1.0 KAM_HTMLNOISE Spam containing useless HTML padding
1.0 ZMIde_OutlookExpress Outlook Express should not be used anymore
0.8 RDNS_NONE Delivered to internal network by a host with no rDNS
3.5 HDR_ORDER_FTSDMCXX_NORDNS Header order similar to spam
(FTSDMCXX/boundary variant) + no rDNS
1.0 KAM_LAZY_DOMAIN_SECURITY Sending domain does not have any
anti-forgery methods
0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe
2.0 HDR_ORDER_FTSDMCXX_DIRECT Header order similar to spam
(FTSDMCXX/boundary variant) + direct-to-MX
1.2 TO_EQ_FM_DIRECT_MX To == From and direct-to-MX
2.0 MIMEOLE_DIRECT_TO_MX MIMEOLE + direct-to-MX
3.5 BITCOIN_SPAM_07 BitCoin spam pattern 07
2.5 DOS_OE_TO_MX Delivered direct to MX with OE headers
0.2 HELO_MISC_IP Looking for more Dynamic IP Relays
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.