Logo



   Greeting from Diplomat Agent Don MarkThis Is To Inform You About My Successfully Arrival At George Bush Intercontinental Airport Texas, Houston-Taxes-USA, Meanwhile I Am Having A Little ProblemWith The aAuthority Because Of The INTERNATIONAL CLEARANCE PERMIT Of Your consignment box Which One Of The Airport Authority That It Will Be ObtainedFrom Benin Republic Custom Authority With The Sum Of $45.DELIVERY 24HRS/OVERNIGHT DELIVERY) URGENTLYYou Also Advice To Reconfirm Your Delivery Address Such As Your Home Address Your Telephone Number And Your Nearest International Airport.Use This Below Information To Send The INTERNATIONAL CLEARANCE PERMIT certificate Fee Which Is The Sum Of $45 To The Benin With Name Of Custom AccountantOfficer.Receivers Name: == EARNEST UDOKA JISIEIKECountry Benin Republic.City::Cotonou..Text Question. In God.Text Answer: We Trust..Senders’ name..Mtcn..You Have To Contact Me With This Telephone Or Send Me An Sms Okay I Am Waiting To Hear From You With the payment details Asap.ThanksMr Don MarkUPS Courier Express CompanyDiplomatic Agent Call Me or Sms Tel No: (313) 451-2385Tel No: (313) 451-2385Email.( info77@qq.com SpamAssassin Report (spam score: 3.6) pts rule name description ---- ---------------------- -------------------------------------------------- 2.6 RCVD_IN_SBL RBL: Received via a relay in Spamhaus SBL [200.11.173.10 listed in zen.spamhaus.org] -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.220.181 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag
Click to view scam #125212 - Sent on May 24, 2015, 5:53 am by udokammajisieike@cantv.net
If you cannot click the link above, Copy & Paste this link: http://grandstoreforu.com/qeyJjIjogODI1MCwgImYiOiAwLCAibSI6IDc1NzUsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 9.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: grandstoreforu.com] 2.5 URIBL_DBL_SPAM Contains a spam URL listed in the DBL blocklist [URIs: grandstoreforu.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: grandstoreforu.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 2.5 TO_NO_BRKTS_FROM_MSSP Multiple formatting errors 0.0 FROM_MISSPACED From: missing whitespace
If you cannot click the link above, Copy & Paste this link: http://grandstoreforu.com/qeyJjIjogODI1MywgImYiOiAwLCAibSI6IDc1NzgsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 6.6) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: grandstoreforu.com] 2.5 URIBL_DBL_SPAM Contains a spam URL listed in the DBL blocklist [URIs: grandstoreforu.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: grandstoreforu.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125209 - Sent on May 24, 2015, 4:10 am by From.Kroger@grandstoreforu.com
Découvrez des milliers de produits tendances et astucieux. Pour visualiser correctement ce message, accédez à la version en ligne Signaler comme indésirable Découvrez la boutique des produits tendances et astucieux et profitez de la livraison offerte pendant 48h chrono.   J'en crois pas mes yeux ! Je profite tout de suite des meilleurs deals pour la maison, le jardin, le bricolage, les loisirs, la forme? [censored]@gmail.com En validant mon adresse, j'accepte de recevoir les meilleures offres trend-corner.com Ne manquez pas de découvrir toutes nos actualités sur www.trend-corner.com BESOIN D'AIDE ? Appelez-nous au 01 48 51 30 00 du lundi au vendredi de 9h30 à 14h30 Cette newsletter contient des cookies destinés à personnaliser les annonces commerciales sauf opposition de votre part.En savoir plus. En application de la loi du 6 janvier 1978 relative à l'informatique, aux fichiers et aux libertés, vous disposez des droits d'opposition, d'accès et de rectification des données vous concernant. Vous pouvez exercer ces droits par courrier postal adressé à :fjb 14 rue de la Bastide 95000 Cergy.Vous pouvez vous désabonner ou modifier vos préférences, suivez ce lien.Les demandes de désabonnement seront prises en compte dans un délai maximum de 24 heures, sauf pour les demandes par courrier postal, qui requièrent un délai de 8 jours SpamAssassin Report (spam score: 4.9) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.214.175 listed in list.dnswl.org] 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: me8.fr] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record 2.4 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level above 50% [cf: 100] 0.4 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% [cf: 100] 1.7 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 1.0 MIME_NO_TEXT No (properly identified) text body parts
Click to view scam #125208 - Sent on May 24, 2015, 3:54 am by contact@me8.fr
  Attn:The Owner of this E-mail id,   Your Name And Your Contact Details Was Given To This Office In Respect Of Your Total inherited/Compensation Sum Owed To You Which You Have Failed To Claim Because Of Either Non-Compliance Of Official Processes Or Because Of Your Unbelief Of The Reality Of Your Genuine Payment.   We Wish To Bring To You The Solution To This Problem. Right Now We Have Arranged Your Payment Through Our Swift Card Payment Centers, That Is The Latest Instruction From Economic Community Of West African States (ECOWAS) This UBA ATM payment Center Will Send To You An ATM DEBIT Card Which You Will Use To Withdraw Your Money In Any ATM Machine In Any Part Of The World, So If You Like To Receive Your Fund In This Way, Please Let Us Know By Contacting Us Back on the following information:   CONTACT: Hon. John Nyeaku. PHONE NUMBER: +2348137358591 And Also Send The Following Information As Listed Below.   1. Full Name 2. Phone And Fax Number 3. Delivery address 4.ATTACH COPY OF YOUR IDENTIFICATION/ If any available   We Have Been Mandated By The ECOWAS Parliament To Issue Out $4.5million usd in your favor This fiscal year. Also For Your Information, You Have To Stop Any Further Communication With Any Other Person (S) Or Office(S) To Avoid Any Hitches In Receiving Your Payment.   Note That Because Of Impostors,We Hereby Issued You Our Code Of Conduct, Which Is (ATM-303) So You Have To Indicate This Code When Contacting The Card Center By Using It As Your Subject. ================================================= AS SOON AS I CONFIRM THE REQUIRED INFORMATION I WILL DIRECT YOU ON HOW TO PROCEED ON IMMEDIATE DISPATCHMENT OF YOUR ATM CARD PAYMENT MEANWHILE PLEASE REPLY to   ================================================   We are here to serve you better.   Immediate ATM DEBIT Cash Card Payment Notification   CONTACT PERSON   Hon. John Nyeaku. Phone: +2348137358591   Regards MRS.Jennifer Linkker SpamAssassin Report (spam score: 16.5) pts rule name description ---- ---------------------- -------------------------------------------------- 1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.220.180 listed in list.dnswl.org] 0.0 FSL_CTYPE_WIN1251 Content-Type only seen in 419 spam 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 NSL_RCVD_FROM_USER Received from User 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 0.0 LOTS_OF_MONEY Huge... sums of money 0.0 FROM_MISSP_XPRIO Misspaced FROM + X-Priority 0.0 FROM_MISSP_MSFT From misspaced + supposed Microsoft tool 1.4 FSL_NEW_HELO_USER Spam's using Helo and User 0.0 AXB_XMAILER_MIMEOLE_OL_024C2 Yet another X header trait 3.4 MSOE_MID_WRONG_CASE MSOE_MID_WRONG_CASE 0.0 FORGED_OUTLOOK_HTML Outlook can't send HTML message only 0.0 FROM_MISSP_TO_UNDISC From misspaced, To undisclosed 0.0 FROM_MISSP_USER From misspaced, from "User" 0.0 MONEY_FROM_MISSP Lots of money and misspaced From 0.0 FROM_MISSPACED From: missing whitespace 0.0 T_FROM_MISSP_DKIM From misspaced, DKIM dependable 2.3 MONEY_ATM_CARD Lots of money on an ATM card 2.8 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook 1.0 XPRIO Has X-Priority header 0.0 T_FILL_THIS_FORM_SHORT Fill in a short form with personal information 0.4 FILL_THIS_FORM_FRAUD_PHISH Answer suspicious question(s) 0.0 MONEY_FORM_SHORT Lots of money if you fill out a short form 3.6 ADVANCE_FEE_3_NEW_MONEY Advance Fee fraud and lots of money
Click to view scam #125207 - Sent on May 24, 2015, 3:29 am by relay@sc.gov.br
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/weyJjIjogODI0OCwgImYiOiAwLCAibSI6IDc1NzMsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/keyJjIjogODI0NywgImYiOiAwLCAibSI6IDc1NzIsICJsIjogMzAsICJzIjogMSwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
 > Date: Sat, 23 May 2015 23:53:45 +0200> From: feedback@nnuh.nhs.uk> To: > Subject: Donation Offer> > > > Mrs Evelyn Ira Curry Picked you for a donation. Contact> ( mrs-evelynracrruy@outlook.cl ) for details.>
Click to view scam #125202 - Sent on May 24, 2015, 2:22 am by feedback@nnuh.nhs.uk
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/qeyJjIjogODI0NSwgImYiOiAwLCAibSI6IDc1NzEsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 5.8) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 1.6 SUBJ_ALL_CAPS Subject is all capitals -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125203 - Sent on May 24, 2015, 2:09 am by realrockhard@tryourstorse.com
Hello, Forgive my intrude into your privacy. My name is Mark Duke and I am the general manager of the Federal reserve bank of Ghana Accra Ghana. I have a business worth of $7.5Million dollars for our mutual benefit. Please reply back to my private email for more details.. Thank you. Email: mark_duke9@outlook.com Mark. SpamAssassin Report (spam score: 2.7) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: outlook.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.214.170 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 LOTS_OF_MONEY Huge... sums of money 3.4 ADVANCE_FEE_4_NEW_MONEY Advance Fee fraud and lots of money
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/geyJjIjogODI0NCwgImYiOiAwLCAibSI6IDc1NzAsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125199 - Sent on May 24, 2015, 1:48 am by asian.beauty@tryourstorse.com
body {height: 100%; color:#000000; font-size:12pt; font-family:Arial;}We can help you with a genuine loan to meet your needs.Do you need a personal or business loan without stress and quick approval?Do you need an urgent loan today? No Credit Checks* LOAN APPROVAL IN 60MINS !!* GUARANTEED SAME DAY TRANSFER !!* 100% APPROVAL RATE !!*LOW INTEREST RATE !!Contact US for more information about loan offer and we will solve your financial problem. contact us via email: hijab01@qq.comSpamAssassin Report (spam score: 0.9) pts rule name description ---- ---------------------- -------------------------------------------------- 0.6 RCVD_IN_SORBS_WEB RBL: SORBS: sender is an abusable web server [150.186.0.8 listed in dnsbl.sorbs.net] -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.50 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record 1.0 MIME_NO_TEXT No (properly identified) text body parts
Click to view scam #125198 - Sent on May 24, 2015, 1:44 am by soporte@unefa.edu.ve
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/ieyJjIjogODI0MywgImYiOiAwLCAibSI6IDc1NjksICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125194 - Sent on May 24, 2015, 1:28 am by Vehicle.Update@tryourstorse.com
Attention, We have deposited the check of your fund ($2.5USD) through money gram department after our final meeting regarding your fund, All you will do is to contact money gram director Mr Danie Iwu call +22998176184 He will give you direction on how you will be receiving the funds daily.Remember to send him your Full information to avoid wrong transfer such as, Receiver's Name_______________ Address: ________________ Country: _____________ Phone Number: _____________ Though,Mr Daniel Iwu has sent $6000 in your name today so contact Mr Daniel Iwu or you call him as soon as you receive this email and tell him to give you the reference, sender name and question/answer to pick the $6000 Please let us know as soon as you received all your fund, Best Regards. MONEY GRAM AGENT SpamAssassin Report (spam score: 1.9) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.192.44 listed in list.dnswl.org] 2.6 RCVD_IN_SBL RBL: Received via a relay in Spamhaus SBL [200.11.173.11 listed in zen.spamhaus.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record
Click to view scam #125193 - Sent on May 24, 2015, 1:12 am by accountunsers@cantv.net
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/ueyJjIjogODI0MiwgImYiOiAwLCAibSI6IDc1NjgsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
SpamAssassin Report (spam score: 1.0) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.214.169 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag
Click to view scam #125190 - Sent on May 24, 2015, 12:53 am by mylene.lauri@notaires.fr
If you cannot click the link above, Copy & Paste this link: http://grandstoreforu.com/oeyJjIjogODI1MiwgImYiOiAwLCAibSI6IDc1NzcsICJsIjogMzAsICJzIjogMSwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 8.3) pts rule name description ---- ---------------------- -------------------------------------------------- 2.5 URIBL_DBL_SPAM Contains a spam URL listed in the DBL blocklist [URIs: grandstoreforu.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: grandstoreforu.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: grandstoreforu.com] 1.7 BAD_CREDIT BODY: Eliminate Bad Credit 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
U.S.Customs and Border ProtectionAddress: 2323 S Shepherd Dr # 1200 Houston , TX 77019Attn; Beneficiary.This is to acknowledge the receipt of your affirmation and to inform you of the latest development in regards to the delivery of your consignment box convey by Courier Diplomatic agent, During the scanning our cash-track machine detected that the content of the consignment box is cash worth USD $3.500, 000 usd in accordance to section 34 and 36 of the Custom sector, It's not acceptable to bring ( over US$100,000 ) into the United States of America without proper documentations and clearance because it shows that the money is either being smuggled into the country or the source of the funds is questionable.It is very important that all the relevant documentations needed to authenticate the source of the funds are provided to prove that the funds were earned legitimately in accordance with the PATRIOT ACT so that IRS and Homeland Security will not knocking at your door, In lieu of the above, it is therefore mandatory that you shall provide the Origin of Funds Certificate ( O.O.F ) to prove that the funds is not links with any form of illegality.Being the beneficiary of the consignment, the Origin of Funds Certificate ( O.O.F ) is the only way of confirming the source of the funds and it is your responsibility to provide the Certificate before the Diplomat will be allowed to complete the delivery of your consignment box to your house.The Diplomat's Flight Details shows that he came from Africa and we have contacted the relevant Authorities in Benin to enquirer about the process of getting the Certificate, We were informed that the beneficiary of the consignment will pay for the Certificate and the cost of this documentation is $67.00 usd and You are to pay the fee directly to the Benin Custom and Border Protection via Western Union Money Transfer in the name stated below so that your delivery will be successful done within 3 hours without any hitch or delay.Here is the information you will use to send the payment through Money Gram or Western union.Receivers Name: JERRY OFORCountry: Benin RepublicCity::::::::::::;CotonouText Question::::::::::URGENTText Answer::::::::::PAYMENTAmount::::::::::::;$67.00 usdMTCN:::::::::SENDER NAME::::::::::After paying the Fee, send the following payment information.1. Sender's Name and Address2. MTCN Number3. Text Question & AnswerOwner package Phone No.Upon the receipt of the payment information, the Certificate will procure in your name by the Benin Authority so that the Diplomat will be allowed to complete the delivery of your consignment to your house today.Yours Faithfully.Mrs. Ahern JaysonA G Commissioner of U.S. Customs and Border Protection (CBP)SpamAssassin Report (spam score: 3.8) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (officfile261[at]gmail.com) -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no trust [183.79.56.192 listed in list.dnswl.org] 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED 1.0 SPF_SOFTFAIL SPF: sender does not match SPF record (softfail) 0.2 FREEMAIL_REPLYTO_END_DIGIT Reply-To freemail username ends in digit ("mrs. ahern jayson" ) 0.2 FREEMAIL_ENVFROM_END_DIGIT Envelope-from freemail username ends in digit (officfile261[at]gmail.com) 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list
Click to view scam #125181 - Sent on May 24, 2015, 12:03 am by officfile261@gmail.com
Advert
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/peyJjIjogODI0MCwgImYiOiAwLCAibSI6IDc1NjcsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 8.5) pts rule name description ---- ---------------------- -------------------------------------------------- 2.7 GUARANTEED_100_PERCENT BODY: One hundred percent guaranteed 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 1.6 SUBJ_ALL_CAPS Subject is all capitals -0.0 SPF_PASS SPF: sender matches SPF record 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125182 - Sent on May 23, 2015, 11:57 pm by Nitroxin@tryourstorse.com
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/zeyJjIjogODIzOSwgImYiOiAwLCAibSI6IDc1NjYsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125180 - Sent on May 23, 2015, 11:35 pm by RussianBrides@tryourstorse.com
      -----Original Message----- From: Fan Kathleen (KING'S COLLEGE HOSPITAL NHS FOUNDATION TRUST) <kfan@nhs.net> To: Fan Kathleen (KING'S COLLEGE HOSPITAL NHS FOUNDATION TRUST) <kfan@nhs.net> Sent: Sat, May 23, 2015 3:11 am Subject: RE: #AOLMsgPart_2_0ad89552-524d-4366-9bd6-7d30a7b456fd td{color: black;} .aolReplacedBody P { MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px }     From: Fan Kathleen (KING'S COLLEGE HOSPITAL NHS FOUNDATION TRUST) Sent: 23 May 2015 10:11 To: Fan Kathleen (KING'S COLLEGE HOSPITAL NHS FOUNDATION TRUST) Subject: A Donation has been made to you email gloriamackenzie151@outlook.com for more details ******************************************************************************************************************** This message may contain confidential information. If you are not the intended recipient please inform the sender that you have received the message in error before deleting it. Please do not disclose, copy or distribute information in this e-mail or take any action in reliance on its contents: to do so is strictly prohibited and may be unlawful. Thank you for your co-operation. NHSmail is the secure email and directory service available for all NHS staff in England and Scotland NHSmail is approved for exchanging patient data and other sensitive information with NHSmail and GSi recipients NHSmail provides an email address for your career in the NHS and can be accessed anywhere ********************************************************************************************************************
Click to view scam #125178 - Sent on May 23, 2015, 11:10 pm by kfan@nhs.net
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/heyJjIjogODIzOCwgImYiOiAwLCAibSI6IDc1NjUsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/keyJjIjogODIzNiwgImYiOiAwLCAibSI6IDc1NjMsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125176 - Sent on May 23, 2015, 10:48 pm by Chris@tryourstorse.com
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/ieyJjIjogODIzNCwgImYiOiAwLCAibSI6IDc1NjEsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Site:http://www.americanseafoods.com Email: americanseafoodscompany653@gmail.com ATTN: Compliments of the season; We want to inform you that we are hiring candidates that will work with American Seafoods [United State] The total recruitment will be 205 applicants. Minimum Age requirements are 18-years and above. This is the Available Position: For more details send your {CV} in contact email: americanseafoodscompany653@gmail.com Best regards, American Seafoods americanseafoodscompany653@gmail.com SpamAssassin Report (spam score: ) pts rule name undefined
Click to view scam #125175 - Sent on May 23, 2015, 10:17 pm by info@americanseafoods.com
Site:http://www.americanseafoods.com Email: americanseafoodscompany653@gmail.com ATTN: Compliments of the season; We want to inform you that we are hiring candidates that will work with American Seafoods [United State] The total recruitment will be 205 applicants. Minimum Age requirements are 18-years and above. This is the Available Position: For more details send your {CV} in contact email: americanseafoodscompany653@gmail.com Best regards, American Seafoods americanseafoodscompany653@gmail.com SpamAssassin Report (spam score: 4.5) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.220.172 listed in list.dnswl.org] 2.6 RCVD_IN_SBL RBL: Received via a relay in Spamhaus SBL [208.113.151.160 listed in zen.spamhaus.org] 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: americanseafoods.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 1.6 SUBJ_ALL_CAPS Subject is all capitals -0.0 SPF_PASS SPF: sender matches SPF record 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails
Click to view scam #125173 - Sent on May 23, 2015, 10:15 pm by info@job.com
p { margin: 0; }-- Attention,This is to inform you that your fund ($9.50000000USD) has approvedto release via Western Union Office after our finally meeting with IMFconcern overdue your fund. All you will do is to contact Western Uniondirector Rev. CharlesWilliam via (worldwidemoneytransfer@hotmail.com ) He will give you direction on howyou will be receiving the funds daily. Remember to send him your Fullinformation to avoid wrong transfer such as it will be cost you sum of $38.00,Receiver's Name_______________Address: ________________Country: _____________Phone Number: _____________Note, Mrs. Rose Uba has sent $7,000.00 in your name today so contactRev. Charles William or you call him +229-99895336 as soon as youreceive this email and tell him to give you MTCN number of $7,000.00sender name to pickup the $7,000.00 Please let us know as soon as youreceived all your fund,Mrs. Rose UbaBest Regards SpamAssassin Report (spam score: 3.4) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.9 SPF_HELO_SOFTFAIL SPF: HELO does not match SPF record (softfail) 2.5 FREEMAIL_FORGED_REPLYTO Freemail in Reply-To, but not From
Click to view scam #125171 - Sent on May 23, 2015, 9:51 pm by hmrc.refund@kppu.go.id
Begin forwarded message:From: Cilia Smith <ciliasmith1970@gmail.com>Date: 23 May 2015 20:59:23 BSTTo: cilia smith <ciliasmith1970@gmail.com>Subject: PartnershipReply-To: ciliasmith440@mail.comDear friend, My name is Sgt.Cilia Smith from USA,serving in the army as a nurse.I have a very good business proposal which both of us will benefit from.All i need is a trust worthy and honest person who i can trust.If you are interested reply to this mail so that i will give you full details of the proposal. I am looking forward to read your reply soon.My best regards,Sgt.Cilia Smith.
Click to view scam #125172 - Sent on May 23, 2015, 9:37 pm by ciliasmith1970@gmail.com
Begin forwarded message:From: "Mr.Wayne Power" <borgioli.tofani@alice.it>Date: 23 May 2015 19:38:38 BSTSubject: paymentReply-To: raymondej33@gmail.comAttentionWe have concluded to transfer your payment- through-western union $5,000daily until the$1,5million US is completely transferred to you accordingly.Though,Director John Basil has sent $5,000 in your name today so contact Agent:below with your full Name,phone contact and addressName:Raymond EjideTEL: (+229) 61923500Email:raymondej33@gmail.comSo hasten up and give the agent a call to process your payment at once.Askhim for the MTCN sender name and test Question/Answer to pick up your firstpayment of $5,000.ThanksFrom Hon Mr.Wayne Power(IMF REPS BENIN)
Click to view scam #125170 - Sent on May 23, 2015, 9:35 pm by borgioli.tofani@alice.it
From: "MSN Promo"<toyer@cybertrade.co.za>Date: May 22, 2015 at 8:11:19 PM PDTTo: Recipients <toyer@cybertrade.co.za>Subject: MSN PromoReply-To: msnpromo1@gmail.comYour Email ID.Has Won You The Sum Of (£500,000,000) From MSN Promo 2015Award. To Claim Send:Name & Age:Address & Sex:Country & Mobile No:Address London, EC4YEQTell: +44 703 190 8710Mr.Terry
Click to view scam #125169 - Sent on May 23, 2015, 9:31 pm by toyer@cybertrade.co.za
Hi dear, My name is Sgt.Cilia Smith from USA,serving in the army as a nurse.I have a very good business proposal which both of us will benefit from.All i need is a trust worthy and honest person who i can trust.If you are interested reply to this mail so that i will give you full details of the proposal. I am looking forward to read your reply soon.My best regards,Sgt.Cilia Smith. SpamAssassin Report (spam score: 5.4) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (ciliasmith1970[at]gmail.com) -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.220.169 listed in list.dnswl.org] 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED -0.0 SPF_PASS SPF: sender matches SPF record 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 0.0 TVD_SPACE_RATIO TVD_SPACE_RATIO 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list 1.0 MIME_NO_TEXT No (properly identified) text body parts 2.7 TVD_SPACE_RATIO_MINFP TVD_SPACE_RATIO_MINFP
Click to view scam #125168 - Sent on May 23, 2015, 9:23 pm by ciliasmith1970@gmail.com
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/oeyJjIjogODIzMywgImYiOiAwLCAibSI6IDc1NjAsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125166 - Sent on May 23, 2015, 9:15 pm by Email.Lookup@tryourstorse.com
DEAR CUSTOMERS THERE IS AN ISSUE WITH THE WESTERN UNION MONEY TRANSFER/ WWW.MONEY GRAM.COM IN THE AMOUNT OF $250.000.00 USD DIRECTED IN CASH CREDITED TO FILE KTU/9023118308/03, AT THE OWNER OF THIS EMAIL ADDRESSES/NAME.THE WESTERN UNION /MONEY GRAM TRANSFER ARE COMPENSATING YOU BECAUSE YOU HAVE REACHED THE LIMIT OF SENDING MONEY THROUGH WESTERN UNION/MONEY GRAM TRANSFER AND DUE TO YOUR ALLOCATED SECURITY CODE.PATRONAGE TO OUR SERVICE LAST YEAR 2014.WE CHOOSE TO SEND IT TO AN EMAIL ADDRESS INSTEAD OF A NAME. WE ARE UNABLE TO COMPLETE A TRANSFER DIRECTED AT AN EMAIL ADDRESS, SO WE REQUIRE SOME MORE INFORMATION IN ORDER TO COMPLETE THIS TRANSFER VIA OUR WESTERN UNION MONEY TRANSFER, THE MTCN NUMBER SHALL BE ISSUE TO YOU AS YOU WILL BE ABLE TO RECEIVE YOUR FUND FROM THE NEAREST SHOP OR WESTERN UNION MONEY TRANSFER SERVICE .1, NAME:2. CONTACT ADDRESS:3. MOBILE PHONE NUMBER:4. OCCUPATION:5. MARITAL STATUS AND AGE: AS SOON AS THIS INFORMATION IS RECEIVED WE ARE GOING TO PROCEED WITH THE FIRST RELEASE OF THE SUM OF $9,500 USD THROUGH OUR WESTERN UNION OR MONEY GRAM TRANSFER.WE ARE SENDING THE FIRST BATCH IN YOUR NAME, AFTER WHICH THE SECOND BATCH WILL BE RELEASE AGAIN UNTIL WE HAVE FINISH THE TRANSFER IN YOUR NAME.NOTE THAT AS SOON AS THE TRANSFER IS MADE WE ARE GOING TO SEND YOU THE TRACKING NUMBER OF THE WESTERN UNION MONEY TRANSFER ,THE SENDERS NAME ,AND THE RECEIVERS NAME,AS YOU ARE REQUIRE TO TRACK DOWN YOUR PAYMENT ONLINE.CONTACT US ON OUR EMAIL ADDRESS AS SOON AS YOU RECEIVE THIS NOTIFICATION I URGE YOU SEND THE INFORMATION? SO THAT I CAN PROCEED WITH THE PROCESSING OF YOUR PAYMENT TO YOU IMMEDIATELY.THE MANAGEMENT OF WESTERN UNION /MONEY GRAM TRANSFER HEAD OFFICE ARE PATRONIZED YOU AS OUR DEAR CUSTOMER.BEST REGARD.MR. ANDREW LEWISWESTERN UNION/MONEY GRAM TRANSFER DEPARTMENT. SpamAssassin Report (spam score: 3.2) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (ms.joangoforth[at]gmail.com) -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.223.193 listed in list.dnswl.org] 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED 1.6 SUBJ_ALL_CAPS Subject is all capitals -0.0 SPF_PASS SPF: sender matches SPF record 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 0.0 TVD_SPACE_RATIO TVD_SPACE_RATIO 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list
Click to view scam #125165 - Sent on May 23, 2015, 8:51 pm by ms.joangoforth@gmail.com
¥¿©v¤é¨t¤k¹²¡?¤F¤u§@¤§¥~ ¥¿©v¤é¨t¤k¹²¡?¤F¤u§@¤§¥~¡AÁ?nÓV¸?D¤Hªº©?¤®@ AV¼t°ÓÁ|¿ì¼v°g¦^õXªA°?A¥i¥H¸ò¦?v³ßÅwªº¤kÀu·R·R ½?ö·?«¥kÁä½?s¶K¤W¤U¦Cºô§}Æ[¬?s§i http://ppt.cc/pgp8 ¡@ SpamAssassin Report (spam score: 17.2) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.192.45 listed in list.dnswl.org] 0.3 MIME_BOUND_DD_DIGITS Spam tool pattern in MIME boundary 2.0 MSGID_SPAM_CAPS Spam tool Message-Id: (caps variant) 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 1.0 HK_RANDOM_FROM From username looks random 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (bqjfpnyxucu[at]163.com) -0.0 SPF_PASS SPF: sender matches SPF record 2.4 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level above 50% [cf: 100] 0.4 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% [cf: 100] 1.7 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) 1.8 MISSING_MIMEOLE Message has X-MSMail-Priority, but no X-MimeOLE 0.0 TVD_SPACE_RATIO TVD_SPACE_RATIO 2.4 FORGED_MUA_IMS Forged mail pretending to be from IMS 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails 1.0 MIME_NO_TEXT No (properly identified) text body parts 1.0 XPRIO Has X-Priority header 2.7 TVD_SPACE_RATIO_MINFP TVD_SPACE_RATIO_MINFP
Click to view scam #125164 - Sent on May 23, 2015, 8:01 pm by bqjfpnyxucu@163.com
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/seyJjIjogODIzMCwgImYiOiAwLCAibSI6IDc1NTgsICJsIjogMzAsICJzIjogMSwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Advert
  Attention,We have deposited the check of your fund ($4.50000000USD) through Western Union department after our finally meeting regarding your fund,All you will do is to contact Western Union directorHe will give you direction on how you will be receiving the funds daily.Remember to send him your Full information to avoid wrong transfer such as,Receiver's Name_______________Address: ________________Country: _____________Phone Number: _____________Though,Dr. Steve Johnson has sent $5000 in your name today so contact Dr. Steve Johnson or you call him as soon as you receive this email and tell him to give you the Mtcn, sender name andquestion/answer to pick the $5000 Please let us know as soon as you received all your fund,Dr. Steve Johnson SpamAssassin Report (spam score: 6.4) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.192.42 listed in list.dnswl.org] 2.6 RCVD_IN_SBL RBL: Received via a relay in Spamhaus SBL [200.11.173.10 listed in zen.spamhaus.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record 0.2 FREEMAIL_REPLYTO_END_DIGIT Reply-To freemail username ends in digit (worldbank420[at]yahoo.com ) 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 LOTS_OF_MONEY Huge... sums of money 2.5 FREEMAIL_FORGED_REPLYTO Freemail in Reply-To, but not From 0.0 MONEY_FROM_41 Lots of money from Africa 0.0 MONEY_FORM_SHORT Lots of money if you fill out a short form
Click to view scam #125162 - Sent on May 23, 2015, 7:26 pm by benjose@cantv.net
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/teyJjIjogODIyOSwgImYiOiAwLCAibSI6IDc1NTcsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125161 - Sent on May 23, 2015, 7:15 pm by Rent.and.Own@tryourstorse.com
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/xeyJjIjogODIyNywgImYiOiAwLCAibSI6IDc1NTYsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: ) pts rule name undefined
Click to view scam #125159 - Sent on May 23, 2015, 6:59 pm by Mini.Cameras@tryourstorse.com
hi
DearI got your details after an extensive on-line search Via (NetworkPower Charitable Trust) for a reliable person,I have a very importantbusiness that I want to discuss with you. because I need an honest andtrust worthy person like you to entrust this huge transfer projectunto.My name is Mr arvel  kojo, The Branch Manager of Standard Chartered Ghana. I am writing to solicit your assistance in the transferof US$7,500,000.00 Dollars. This fund is the excess of what my branchin which I am the manager made as profit last year (i.e. 2014financial year). I have already submitted an annual report for thatyear to my head office in Accra-Ghana as I have watched with keeninterest as they will never know of this excess. I have since, placedhis amount of US$7,500,000.00 Dollars on an Escrow Coded accountwithout a beneficiary (Anonymous) to avoid trace.As an officer of the bank, I cannot be directly connected to thismoney thus I am impelled to request for your assistance to receivethis money into your bank account on my behalf. I agree that 45% ofthis money will be for you as a foreign partner, in respect to theprovision of a foreign account, and 55% would be for me. I do need tostress that there are practically no risk involved in this. It's goingto be a bank-to-bank transfer. All I need from you is to stand as theoriginal depositor of this fund so that the fund can be transferred toyour account.If you accept this offer, I will appreciate your timelyresponse to me. This is why and only reason why I contacted you, I amwilling to go into partnership investment with you knowing to yourwealth of experience,So please if you are interested to assist on this venture kindlycontact me back for a brief discussion on how to proceed.Best regards,Mr.arvel  kojo. SpamAssassin Report (spam score: 5.5) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.48 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (arvelkojo7[at]gmail.com) 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED -0.0 SPF_PASS SPF: sender matches SPF record 1.2 MISSING_HEADERS Missing To: header 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 2.7 MALFORMED_FREEMAIL Bad headers on message from free email service 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list 1.0 MIME_NO_TEXT No (properly identified) text body parts
Click to view scam #125160 - Sent on May 23, 2015, 6:54 pm by arvelkojo7@gmail.com
PLEASE MY DEAR FRIEND I WANT YOU TO OPEN THIS ATTACHMENT FOR MORE INFORMATION SpamAssassin Report (spam score: 2.8) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.214.195 listed in list.dnswl.org] 0.9 URG_BIZ BODY: Contains urgent matter 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (alkomaibru113[at]gmail.com) 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED -0.0 SPF_PASS SPF: sender matches SPF record 0.2 FREEMAIL_ENVFROM_END_DIGIT Envelope-from freemail username ends in digit (alkomaibru113[at]gmail.com) 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list 1.0 MIME_NO_TEXT No (properly identified) text body parts
Click to view scam #125158 - Sent on May 23, 2015, 6:41 pm by mrkashifakram27@gmail.com
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/ieyJjIjogODIyNiwgImYiOiAwLCAibSI6IDc1NTUsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 5.8) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record 1.6 SUBJ_ALL_CAPS Subject is all capitals -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_HK_NAME_DR T_HK_NAME_DR 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
FREELOTTO AFFILIATED OFFICE U.KGOVERNMENT ACCREDITEDLICENSED LOTTERY PROMOTERS.FREELOTTO AFFILIATED OFFICE U.K,82 VICTORIA STREET VICTORIA LONDONSW1 U.KNOTIFICATION OF WINNINGREF : CODE (1177) Attn "We are pleased to inform you of the release of the recent results of the FREELOTTO INTERNATIONAL EMAIL PROMOTION PROGRAM held on the 11th of May 2015.You were entered as dependent clientswith: Reference Serial Number:F2-003-036 and Batch number FR/45-300-07. Your email address attached to the ticket number: 50-23-17-52-34-34  that draw the lucky winning number,which consequently won the Daily new year Jackpot in the first category,in four parts.You have been approved for a payment of $2,000,000.00 (Two Million United States Dollars) in cash credited to file reference number: TFR/9900034943/JPT.All participants for the online version were selected randomly from World Wide Web sites through computer draw system and extracted from over 100,000 unions, associations and co-operate bodies that are listed online.This email promotion takes place every month. Please note that your lucky winning number falls within our European booklet representative office in Europe as indicated in your play coupon.In view of this, your $2,000,000.00 (Two Million United States Dollars) would be released to you by our payment office in United Kingdom.Our Fiduciary agent will immediately commence the process to facilitate the release of your funds as soon as you contact him. For security reasons, you are advised to keep your winning information confidential till your claim is processed and your money remitted to you.This is part of our precautionary measure to avoid double claiming and unwarranted abuse of this program,Please be warned.click on the website link below to view the photo page of some of our recent lucky winners.http://www.freelotto.com/winners.asp FreeLotto Winning Draw Results for th 29MAY, 2015.$50,000.00: 4-5-34-41-3-37$200,000.00: 22-43-6-9-28-26$10,000.00: 12-32-17-14-24-10$100,000.00 : 2-27-22-47-16-21Monthly Jackpot $2,000,000.00: 50-23-17-52-34-34Super Bucks $10,000,000.00 : 37-2-48-41-46- 25-43To file for your claim, please contact your fiduciary agent immediately via the email below:Mr. Williams Ford(Freelotto Fiduciary Department)82 Victoria StreetVictoria London SW1 U.K OR Contact our Asia agent.Email: customer_service.12@outlook.comProvide him with these following details with which he will begin the processing of your winnings.1.NAME IN FULL:2.ADDRESS:3.AGE:4.PHONE:5.FAX:6.SEX:7.MARITAL STATUS:8.OCCUPATION:9.COMPANY NAME/POSITION:10.COUNTRY:11.NATIONALITY:12.EMAIL:***********************************************************************The Freelotto Internet draw is held every month and is so organized to encourage the use of the Internet and computer worldwide. We are proud to say that over 400 millions U.S Dollars are won annually in more than 118 countries Worldwide. Warning!!!: Fraudulent emails are circulating that appear to be using Free Lotto addresses, but are not from The Free Lotto.Once again congratulations.Sincerely,Kevin J. AroninCopyright © 1995-2015 The FREELOTTO NationalLottery Inc. All rights reserved. Terms of Service - Guideline+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++NB: You are advised to keep your winning strictly confidential until your winning is processed and received by you.This is to avoid double claiming which could lead to disqualification.SpamAssassin Report (spam score: 8.7) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no trust [67.195.87.234 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (williamsford269[at]yahoo.co.uk) 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED 0.2 FREEMAIL_REPLYTO_END_DIGIT Reply-To freemail username ends in digit (williams ford ) 0.2 FREEMAIL_ENVFROM_END_DIGIT Envelope-from freemail username ends in digit (williamsford269[at]yahoo.co.uk) 1.2 MISSING_HEADERS Missing To: header 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 2.7 MALFORMED_FREEMAIL Bad headers on message from free email service 1.9 REPLYTO_WITHOUT_TO_CC REPLYTO_WITHOUT_TO_CC 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list
Click to view scam #125156 - Sent on May 23, 2015, 6:33 pm by williamsford269@yahoo.co.uk
God Bless You, I write to you in good faith and hoping that you will understand the importance of my email. My decision to contact you is because I have been recently diagnosed with Cancer and the doctor said I have less than 3 weeks to live. Since this sudden news was announced to me, I have been reflecting over my life in the past. It is painful that after over 18 years of peaceful marriage with my late husband, we had no child of our own that will inherit our numerous wealth. i have been suffering from ovarian cancer disease since them, i surprise the doctor says to me that i will not survive to live longer due to the damage infection operation which i did recently and i struggle to write you this memorandum in tears/sorrow through the help of my laptop computer beside my sick-bed hospital.london uk In the past, I have made reasonable donations to the victims of Earthquake in Haiti and recently to the same victims in Japan and Thailand. Now that my health is gradually deteriorating, I cannot continue to do all these by myself any more. I strongly desire to reach out to the poor and needy people, but I would prefer to continue this with the assistance of a kind person. I want you to answer the following questions, (1) are you a God fearing person? (2) If I donate (10.5M) Ten Million Five Hundred Thousand Dollars  to you, can you be able to utilize it wisely to achieve my heart desire of supporting poor people around you? (3)Will you open a charity foundation in the name of my husband and 1? you will only do change of ownership in your name before the bank will transfer the fund to your account because the fund was deposited with the name of my late husband  the bank will also release to you the 200KG OF GOLD  you will look for the buyer Please reply me as soon as possible. Yours Faithfully. Mrs Sandra Dewi SpamAssassin Report (spam score: 6.3) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.48 listed in list.dnswl.org] 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: yahoo.dk] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (dewi2014[at]yahoo.dk) 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED -0.0 SPF_PASS SPF: sender matches SPF record 0.2 FREEMAIL_REPLYTO_END_DIGIT Reply-To freemail username ends in digit (dewi2014[at]yandex.com ) 0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 RCVD_IN_SORBS_WEB RBL: SORBS: sender is an abusable web server [212.52.159.73 listed in dnsbl.sorbs.net] 0.0 LOTS_OF_MONEY Huge... sums of money 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list 3.8 ADVANCE_FEE_5_NEW_MONEY Advance Fee fraud and lots of money
Click to view scam #125153 - Sent on May 23, 2015, 6:24 pm by dewi2014@yahoo.dk
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/leyJjIjogODIyNSwgImYiOiAwLCAibSI6IDc1NTQsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
Click to view scam #125150 - Sent on May 23, 2015, 6:19 pm by WEN.Hair.Care@tryourstorse.com
Untitled document Hi, purchasing manager.Good day!We are screen protector supplier,and we have researched & designed some new models.If you are interested in, I 'll send you our catalogue.Thanks for your valuable time.Regards.AMY Wechat:aixian2969 Skype:wei.aixian     SpamAssassin Report (spam score: 11.5) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.46 listed in list.dnswl.org] 2.5 URIBL_DBL_SPAM Contains a spam URL listed in the DBL blocklist [URIs: jienisichen.com] 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: jienisichen.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FROM_LOCAL_DIGITS From: localpart has long digit sequence 0.3 FROM_LOCAL_HEX From: localpart has long hexadecimal sequence 1.9 URIBL_JP_SURBL Contains an URL listed in the JP SURBL blocklist [URIs: jienisichen.com] 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (ab18677082969[at]163.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.6 HTML_IMAGE_ONLY_12 BODY: HTML: images with 800-1200 bytes of words 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars 2.4 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level above 50% [cf: 100] 0.4 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% [cf: 100] 1.7 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 0.0 T_REMOTE_IMAGE Message contains an external image
Click to view scam #125154 - Sent on May 23, 2015, 6:12 pm by ab18677082969@163.com
Greetings My Partner I need your urgent assistance in transferring the sum of($(15)million to your account within 10 or 14 banking days,if you are ready to assit me get back to me I will give you full details on how the business will be executed and also note that you will have 40% of the above mentioned sum, PLS DO NOT FAIL TO REPLY TO THIS  Email(johanali@hotmail.com (1.) your Name: (2.) Country: (3.)Phone Nb: (4.)your passport: (5.)your Occupation: (6.)Your Age: Best Regards, Mr Johan Ali SpamAssassin Report (spam score: 4.3) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.52 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (mrsa_esth[at]aol.fr) -0.0 SPF_PASS SPF: sender matches SPF record 1.2 MISSING_HEADERS Missing To: header 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 2.7 MALFORMED_FREEMAIL Bad headers on message from free email service 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 1.0 MIME_NO_TEXT No (properly identified) text body parts
Click to view scam #125149 - Sent on May 23, 2015, 6:09 pm by mrsa_esth@aol.fr
If you cannot click the link above, Copy & Paste this link: http://tryourstorse.com/geyJjIjogODIyMywgImYiOiAwLCAibSI6IDc1NTMsICJsIjogMzAsICJzIjogMCwgInUiOiAxOTM0MTIxMTAsICJ0IjogMSwgInNkIjogMH0= SpamAssassin Report (spam score: 4.1) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: tryourstorse.com] 0.3 URIBL_RHS_DOB Contains an URI of a new domain (Day Old Bread) [URIs: tryourstorse.com] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_HELO_PASS SPF: HELO matches SPF record -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 2.0 BASE64_LENGTH_79_INF BODY: base64 encoded email part uses line length greater than 79 characters 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid
View attachment SpamAssassin Report (spam score: 4.3) pts rule name description ---- ---------------------- -------------------------------------------------- 1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.49 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 TVD_SPACE_RATIO TVD_SPACE_RATIO 1.0 MIME_NO_TEXT No (properly identified) text body parts 2.7 TVD_SPACE_RATIO_MINFP TVD_SPACE_RATIO_MINFP
Click to view scam #125146 - Sent on May 23, 2015, 6:02 pm by essiba@mbnet.fi
  I have registered your ATM CARD of US$(15.5M) with UPS Courier Company with registration code of(Shipment Code awb 33xzs)please Contact withyour delivery information such as,Your Name,Address and Telephone Number:Name of Dir:Mr.Mike GEORGE E-mail:(upscouriercompany@inbox.lv)Tel:+229 98965580 Best Regards, Mr Eric Johnson SpamAssassin Report (spam score: 3.6) pts rule name description ---- ---------------------- -------------------------------------------------- 2.6 RCVD_IN_SBL RBL: Received via a relay in Spamhaus SBL [200.11.173.11 listed in zen.spamhaus.org] -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.42 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address -0.0 SPF_PASS SPF: sender matches SPF record 0.0 HTML_MESSAGE BODY: HTML included in message 1.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 0.6 HTML_MIME_NO_HTML_TAG HTML-only message, but there is no HTML tag
Click to view scam #125145 - Sent on May 23, 2015, 5:54 pm by mailbox68@cantv.net
Salaam I am pleased to contact you on a business platform haven received your details from an investment consultant in a recent leading international business round-table engagement. We are a UAE based investment company working on financing projects and my company will be interested and willing to fund you in any current project you are undergoing as we are privately seeking means of expanding DAMAC Investments LLC portfolio internationally. To this end, we seek to know the possibility of going into partnership discussion with your company within your present scope of business. Should you be interested to engage us for a more detailed discussion on the aforementioned proposal, we would be happy to do so in whatever medium you find much more appropriate for this engagement. I look forward to your favorable response. Zeyad Yousif Deen Chief Financial Officer| DAMAC Investments LLC damacinvestmentsllc@gmail.com Tel: +971561123565 SpamAssassin Report (spam score: 1.6) pts rule name description ---- ---------------------- -------------------------------------------------- -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at http://www.dnswl.org/, low trust [209.85.218.45 listed in list.dnswl.org] 0.0 TVD_RCVD_IP4 Message was received from an IPv4 address 0.0 TVD_RCVD_IP Message was received from an IP address 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (ceasex005[at]gmail.com) 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED -0.0 SPF_PASS SPF: sender matches SPF record 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid 0.0 T_DKIM_INVALID DKIM-Signature header exists but is not valid 1.0 FREEMAIL_REPLYTO Reply-To/From or Reply-To/body contain different freemails 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list
Click to view scam #125142 - Sent on May 23, 2015, 5:37 pm by ceasex005@gmail.com