stefan novak wrote:
> I've updatet the file with the headers:
> 
> http://pastebin.com/m6e31520c

Scored high here:

Content analysis details:   (32.9 points, 10.0 required)

 pts rule name              description
---- ----------------------
--------------------------------------------------
 3.5 BAYES_99               BODY: Bayesian spam probability is 99 to 100%
                            [score: 1.0000]
 1.2 TO_MALFORMED           To: has a malformed address
 1.0 RELAY_AR               Relayed through Argentina
 0.5 BOTNET_BADDNS          Relay doesn't have full circle DNS

[botnet_baddns,ip=190.51.32.122,rdns=190-51-32-122.speedy.com.ar]
 0.5 RCVD_IN_UCEPROTECT_3   RBL: Sender listed in UCEPROTECT_3
                            [190.51.32.122 listed in dnsbl-3.uceprotect.net]
 1.0 RCVD_IN_JMF_BL         RBL: Sender listed in JMF-BLACK
                       [190.51.32.122 listed in
hostkarma.junkemailfilter.com]
 1.0 RCVD_IN_UCEPROTECT_2   RBL: Sender listed in UCEPROTECT_2
                            [190.51.32.122 listed in dnsbl-2.uceprotect.net]
 2.0 RCVD_IN_UCEPROTECT_1   RBL: Sender listed in UCEPROTECT_1
                            [190.51.32.122 listed in dnsbl-1.uceprotect.net]
 0.9 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                            [190.51.32.122 listed in zen.spamhaus.org]
 3.0 RCVD_IN_XBL            RBL: Received via a relay in Spamhaus XBL
 1.5 RCVD_IN_BARRACUDA      RBL: Sender listed in Barracuda Relay Black List
                            [190.51.32.122 listed in b.barracudacentral.org]
 2.5 RCVD_IN_NERDS_AR       RBL: Received from Argentina
                            [190.51.32.122 listed in zz.countries.nerd.dk]
 0.5 BOTNET                 Relay might be a spambot or virusbot
[botnet0.8,ip=190.51.32.122,rdns=190-51-32-122.speedy.com.ar,maildomain=alfa.com,baddns,client,ipinhostname]
 0.5 BOTNET_IPINHOSTNAME    Hostname contains its own IP address

[botnet_ipinhosntame,ip=190.51.32.122,rdns=190-51-32-122.speedy.com.ar]
 0.5 BOTNET_CLIENT          Relay has a client-like hostname
[botnet_client,ip=190.51.32.122,rdns=190-51-32-122.speedy.com.ar,ipinhostname]
 0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay
lines
 1.0 LONGWORDS_15           BODY: string of 15+ random letters
 1.0 GENERIC_IXHASH         BODY: iXhash found @ generic.ixhash.net
 1.0 NIXSPAM_IXHASH         BODY: iXhash found @ ix.dnsbl.manitu.net
 2.2 DCC_CHECK              Listed in DCC
(http://rhyolite.com/anti-spam/dcc/)
 0.1 RDNS_DYNAMIC           Delivered to trusted network by host with
                            dynamic-looking rDNS
 4.5 KAM_UNIV               Diploma Mill Rule
 2.0 BOTNET_WU              BOTNET_WU
 1.0 SAGREY                 Adds 1.0 to spam from first-time senders

Might consider adding some of the available plugins and using sa-update
to grab Justin's "sought" rules, if not already doing so.

Bill

Reply via email to