[Debian-med-packaging] Undeliverable: [BULK] Suspected Spam X732GP4NX8O6646JW
postmaster at vanguardcomputers.com
postmaster at vanguardcomputers.com
Wed Oct 5 13:12:31 BST 2022
Delivery has failed to these recipients or groups:
web (web at fleetsurety.com)<mailto:web at fleetsurety.com>
The email address you entered couldn't be found. Please check the recipient's email address and try to resend the message. If the problem continues, please contact your email admin.
Diagnostic information for administrators:
Generating server: vcsexchangeaws2.vcsny.com
web at fleetsurety.com
Remote Server returned '550 5.1.10 RESOLVER.ADR.RecipientNotFound; Recipient not found by SMTP address lookup'
Original message headers:
Received: from vcsexchangeaws2.vcsny.com (172.31.12.158) by
vcsexchangeaws2.vcsny.com (172.31.12.158) with Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
15.1.2507.9; Wed, 5 Oct 2022 08:12:31 -0400
Received: from barracuda.vcsny.com (3.210.75.216) by vcsexchangeaws2.vcsny.com
(172.31.12.158) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.9 via Frontend
Transport; Wed, 5 Oct 2022 08:12:31 -0400
X-ASG-Debug-ID: 1664971923-08b04842ce263510001-wOKAWy
Received: from lists.alioth.debian.org ([115.148.40.65]) by barracuda.vcsny.com with ESMTP id fGj4D9CdAeijU9wo for <web at fleetsurety.com>; Wed, 05 Oct 2022 08:12:04 -0400 (EDT)
X-Barracuda-Envelope-From: debian-med-packaging at lists.alioth.debian.org
X-Barracuda-Effective-Source-IP: UNKNOWN[115.148.40.65]
X-Barracuda-Apparent-Source-IP: 115.148.40.65
X-GUID: 11D1C79E-A342-4D41-A1B1-A84EF31CC986
X-Has-Attach: yes
From: VHz0C <debian-med-packaging at lists.alioth.debian.org>
Subject: [BULK] Suspected Spam X732GP4NX8O6646JW
To: web <web at fleetsurety.com>
X-ASG-Orig-Subj: X732GP4NX8O6646JW
Content-Type: multipart/mixed; charset="GB2312";
boundary="----=_908_NextPart316054775487_=----"
MIME-Version: 1.0
Reply-To: edyr6765 at 21cn.com
Date: Wed, 5 Oct 2022 20:12:07 +0800
Message-ID: <202210052011566134843 at lists.alioth.debian.org>
X-Mailer: Foxmail 7, 2, 5, 140[cn]
X-Barracuda-Connect: UNKNOWN[115.148.40.65]
X-Barracuda-Start-Time: 1664971923
X-Barracuda-URL: https://barracuda.vcsny.com:443/cgi-mod/mark.cgi
X-Barracuda-BRTS-Status: 1
X-Virus-Scanned: by bsmtpd at vcsny.com
X-Barracuda-Scan-Msg-Size: 339
X-Barracuda-Spam-Score: 0.60
X-Barracuda-Spam-Status: No, SCORE=0.60 using per-user scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=4.0 KILL_LEVEL=5.0 tests=BSF_SC0_SA912_RP_FR, HTML_IMAGE_ONLY_04, HTML_IMAGE_ONLY_04_2, HTML_MESSAGE, MIME_HTML_ONLY, MPART_ALT_DIFF, RDNS_NONE, WEIRD_QUOTING
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.101205
Rule breakdown below
pts rule name description
---- ---------------------- --------------------------------------------------
0.00 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
0.00 WEIRD_QUOTING BODY: Weird repeated double-quotation marks
0.00 HTML_MESSAGE BODY: HTML included in message
0.14 MPART_ALT_DIFF BODY: HTML and text parts are different
0.00 HTML_IMAGE_ONLY_04 BODY: HTML: images with 0-400 bytes of words
0.10 RDNS_NONE Delivered to trusted network by a host with no rDNS
0.01 BSF_SC0_SA912_RP_FR Custom Rule BSF_SC0_SA912_RP_FR
0.34 HTML_IMAGE_ONLY_04_2 HTML: images with 0-400 bytes of words
X-Barracuda-Spam-Flag: YES
Return-Path: debian-med-packaging at lists.alioth.debian.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-med-packaging/attachments/20221005/d2411ff6/attachment-0001.htm>
-------------- next part --------------
An embedded message was scrubbed...
From: VHz0C <debian-med-packaging at lists.alioth.debian.org>
Subject: [BULK] Suspected Spam X732GP4NX8O6646JW
Date: Wed, 5 Oct 2022 20:12:07 +0800
Size: 426242
URL: <http://alioth-lists.debian.net/pipermail/debian-med-packaging/attachments/20221005/d2411ff6/attachment-0001.eml>
More information about the Debian-med-packaging
mailing list