[Debian-med-packaging] Undeliverable: [BULK] Suspected Spam X732GP4NX8O6646JW

postmaster at vanguardcomputers.com postmaster at vanguardcomputers.com
Wed Oct 5 13:12:31 BST 2022


Delivery has failed to these recipients or groups:

web (web at fleetsurety.com)<mailto:web at fleetsurety.com>
The email address you entered couldn't be found. Please check the recipient's email address and try to resend the message. If the problem continues, please contact your email admin.








Diagnostic information for administrators:

Generating server: vcsexchangeaws2.vcsny.com

web at fleetsurety.com
Remote Server returned '550 5.1.10 RESOLVER.ADR.RecipientNotFound; Recipient not found by SMTP address lookup'

Original message headers:

Received: from vcsexchangeaws2.vcsny.com (172.31.12.158) by
 vcsexchangeaws2.vcsny.com (172.31.12.158) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2507.9; Wed, 5 Oct 2022 08:12:31 -0400
Received: from barracuda.vcsny.com (3.210.75.216) by vcsexchangeaws2.vcsny.com
 (172.31.12.158) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.9 via Frontend
 Transport; Wed, 5 Oct 2022 08:12:31 -0400
X-ASG-Debug-ID: 1664971923-08b04842ce263510001-wOKAWy
Received: from lists.alioth.debian.org ([115.148.40.65]) by barracuda.vcsny.com with ESMTP id fGj4D9CdAeijU9wo for <web at fleetsurety.com>; Wed, 05 Oct 2022 08:12:04 -0400 (EDT)
X-Barracuda-Envelope-From: debian-med-packaging at lists.alioth.debian.org
X-Barracuda-Effective-Source-IP: UNKNOWN[115.148.40.65]
X-Barracuda-Apparent-Source-IP: 115.148.40.65
X-GUID: 11D1C79E-A342-4D41-A1B1-A84EF31CC986
X-Has-Attach: yes
From: VHz0C <debian-med-packaging at lists.alioth.debian.org>
Subject: [BULK] Suspected Spam  X732GP4NX8O6646JW
To: web <web at fleetsurety.com>
X-ASG-Orig-Subj: X732GP4NX8O6646JW
Content-Type: multipart/mixed; charset="GB2312";
        boundary="----=_908_NextPart316054775487_=----"
MIME-Version: 1.0
Reply-To: edyr6765 at 21cn.com
Date: Wed, 5 Oct 2022 20:12:07 +0800
Message-ID: <202210052011566134843 at lists.alioth.debian.org>
X-Mailer: Foxmail 7, 2, 5, 140[cn]
X-Barracuda-Connect: UNKNOWN[115.148.40.65]
X-Barracuda-Start-Time: 1664971923
X-Barracuda-URL: https://barracuda.vcsny.com:443/cgi-mod/mark.cgi
X-Barracuda-BRTS-Status: 1
X-Virus-Scanned: by bsmtpd at vcsny.com
X-Barracuda-Scan-Msg-Size: 339
X-Barracuda-Spam-Score: 0.60
X-Barracuda-Spam-Status: No, SCORE=0.60 using per-user scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=4.0 KILL_LEVEL=5.0 tests=BSF_SC0_SA912_RP_FR, HTML_IMAGE_ONLY_04, HTML_IMAGE_ONLY_04_2, HTML_MESSAGE, MIME_HTML_ONLY, MPART_ALT_DIFF, RDNS_NONE, WEIRD_QUOTING
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.101205
        Rule breakdown below
         pts rule name              description
        ---- ---------------------- --------------------------------------------------
        0.00 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
        0.00 WEIRD_QUOTING          BODY: Weird repeated double-quotation marks
        0.00 HTML_MESSAGE           BODY: HTML included in message
        0.14 MPART_ALT_DIFF         BODY: HTML and text parts are different
        0.00 HTML_IMAGE_ONLY_04     BODY: HTML: images with 0-400 bytes of words
        0.10 RDNS_NONE              Delivered to trusted network by a host with no rDNS
        0.01 BSF_SC0_SA912_RP_FR    Custom Rule BSF_SC0_SA912_RP_FR
        0.34 HTML_IMAGE_ONLY_04_2   HTML: images with 0-400 bytes of words
X-Barracuda-Spam-Flag: YES
Return-Path: debian-med-packaging at lists.alioth.debian.org

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-med-packaging/attachments/20221005/d2411ff6/attachment-0001.htm>
-------------- next part --------------
An embedded message was scrubbed...
From: VHz0C <debian-med-packaging at lists.alioth.debian.org>
Subject: [BULK] Suspected Spam  X732GP4NX8O6646JW
Date: Wed, 5 Oct 2022 20:12:07 +0800
Size: 426242
URL: <http://alioth-lists.debian.net/pipermail/debian-med-packaging/attachments/20221005/d2411ff6/attachment-0001.eml>


More information about the Debian-med-packaging mailing list