Prv8 Shell
Server : Apache
System : Linux server.mata-lashes.com 3.10.0-1160.90.1.el7.x86_64 #1 SMP Thu May 4 15:21:22 UTC 2023 x86_64
User : matalashes ( 1004)
PHP Version : 8.1.29
Disable Function : NONE
Directory :  /home/matalashes/mail/.spam/new/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : /home/matalashes/mail/.spam/new/1727209949.M990764P16001.server.mata-lashes.com,S=4222,W=4303
Return-Path: <daikaifpiao@aol.com>
Delivered-To: matalashes+spam@server.mata-lashes.com
Received: from server.mata-lashes.com
	by server.mata-lashes.com with LMTP
	id QLDuOd0h82aBPgAAPWvnSA
	(envelope-from <daikaifpiao@aol.com>)
	for <matalashes+spam@server.mata-lashes.com>; Tue, 24 Sep 2024 20:32:29 +0000
Return-path: <daikaifpiao@aol.com>
Envelope-to: africa@mata-lashes.com
Delivery-date: Tue, 24 Sep 2024 20:32:29 +0000
Received: from [119.41.200.76] (port=49417 helo=aol.com)
	by server.mata-lashes.com with esmtp (Exim 4.96.2)
	(envelope-from <daikaifpiao@aol.com>)
	id 1stCCs-00049L-1U
	for africa@mata-lashes.com;
	Tue, 24 Sep 2024 20:32:29 +0000
From: daikaifpiao@aol.com
To: africa@mata-lashes.com
Content-Type: text/plain;charset="GB2312"
Content-Transfer-Encoding: 8bit
Date: Wed, 25 Sep 2024 04:32:18 +0800
X-Priority: 3
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-Spam-Status: Yes, score=19.1
X-Spam-Score: 191
X-Spam-Bar: +++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "server.mata-lashes.com",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  ����������ҵ����ֵ˰��Ʊ���۸�ʵ�ݡ�����֤�󸶿� ����ϵ��13564999872ľ�ӣ�+΢��
    
 Content analysis details:   (19.1 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in
                             bl.spamcop.net
               [Blocked - see <https://www.spamcop.net/bl.shtml?119.41.200.76>]
  0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [119.41.200.76 listed in sa-accredit.habeas.com]
  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [119.41.200.76 listed in bl.score.senderscore.com]
  0.0 RCVD_IN_ZEN_BLOCKED_OPENDNS RBL: ADMINISTRATOR NOTICE: The query
                              to zen.spamhaus.org was blocked due to
                             usage of an open resolver. See
                             https://www.spamhaus.org/returnc/pub/
                             [119.41.200.76 listed in zen.spamhaus.org]
  0.0 T_SPF_HELO_TEMPERROR   SPF: test of HELO record failed (temperror)
  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail
                             provider
                             [daikaifpiao[at]aol.com]
  0.0 T_SPF_TEMPERROR        SPF: test of record failed (temperror)
  2.0 PYZOR_CHECK            Listed in Pyzor
                             (https://pyzor.readthedocs.io/en/latest/)
  3.0 KAM_DMARC_REJECT       DKIM has Failed or SPF has failed on the
                             message and the domain has a DMARC reject
                             policy
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  0.0 SPOOFED_FREEMAIL_NO_RDNS From SPOOFED_FREEMAIL and no rDNS
  3.1 DOS_OE_TO_MX           Delivered direct to MX with OE headers
  2.5 TO_NO_BRKTS_MSFT       To: lacks brackets and supposed Microsoft tool
  0.0 SPOOFED_FREEMAIL       No description available.
  2.5 TVD_SPACE_ENCODED      Space ratio & encoded subject
  0.0 TVD_SPACE_RATIO_MINFP  Space ratio (vertical text obfuscation?)
  2.8 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
Subject:  ***SPAM***  =?GB2312?B?tPrpX7eixrExMzU2NDk5OTg3MsDu?=


����������ҵ����ֵ˰��Ʊ���۸�ʵ�ݡ�����֤�󸶿�

����ϵ��13564999872ľ�ӣ�+΢��

haha - 2025