Spam detection software, running on the system "web4.venez.net", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
the administrator of that system for details.
Content preview: Fast f*ck with milfs- http://tiny.cc/8rf0iy Fast f*ck with
milfs- http://tiny.cc/8rf0iy [...]
Content analysis details: (14.0 points, 4.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
3.3 RCVD_IN_SBL_CSS RBL: Received via a relay in Spamhaus SBL-CSS
[119.201.64.56 listed in zen.spamhaus.org]
0.4 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL
1.4 RCVD_IN_BRBL_LASTEXT RBL: RCVD_IN_BRBL_LASTEXT
[119.201.64.56 listed in bb.barracudacentral.org]
1.3 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see <http://www.spamcop.net/bl.shtml?119.201.64.56>]
3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100%
[score: 1.0000]
1.1 INVALID_DATE Invalid Date: header (not RFC 2822)
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
(xiftz[at]outlook.com)
0.7 SPF_HELO_SOFTFAIL SPF: HELO does not match SPF record (softfail)
0.2 BAYES_999 BODY: Bayes spam probability is 99.9 to 100%
[score: 1.0000]
0.0 HTML_MESSAGE BODY: HTML included in message
1.2 HTML_IMAGE_ONLY_04 BODY: HTML: images with 0-400 bytes of words
0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars
0.8 RDNS_NONE Delivered to internal network by a host with no rDNS
0.0 HTML_SHORT_LINK_IMG_1 HTML is very short with a linked image
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.