
| Current Path : /home/ift/mails/33/ |
Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64 |
| Current File : //home/ift/mails/33/1533771775.zrspam.338063_2018_08_09 |
From 5856-7931-124885-1543-christian.gabriel=ift-informatik.de@mail.snapcugrr.us Thu Aug 9 01:42:55 2018
Return-Path: <5856-7931-124885-1543-christian.gabriel=ift-informatik.de@mail.snapcugrr.us>
X-Original-To: cgabriel@ift-informatik.de
Delivered-To: cgabriel@ift-informatik.de
Received: by ift-informatik.de (Postfix, from userid 5555)
id AFE8D3D200AA1; Thu, 9 Aug 2018 01:42:55 +0200 (CEST)
Received: from localhost by h2486555.stratoserver.net
with SpamAssassin (version 3.4.0);
Thu, 09 Aug 2018 01:42:55 +0200
From: "Tactical-Survival Watch" <info@snapcugrr.us>
To: <christian.gabriel@ift-informatik.de>
Subject: *****SPAM***** New 6-in-1 Tactical-Survival Watch Might Be The Last Watch You Ever Buy
Date: Thu, 9 Aug 2018 01:08:27 +0200
Message-Id: <jng41hw5mckktdax-me6hyxv7odyhj30a-1efb-1e7d5@snapcugrr.us>
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
h2486555.stratoserver.net
X-Spam-Flag: YES
X-Spam-Level: *****
X-Spam-Status: Yes, score=5.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,HTML_FONT_LOW_CONTRAST,HTML_MESSAGE,
RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK,RDNS_NONE,
URIBL_BLOCKED,URIBL_DBL_SPAM,URIBL_JP_SURBL autolearn=no autolearn_force=no
version=3.4.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_5B6B7FFF.7DA4EE04"
This is a multi-part message in MIME format.
------------=_5B6B7FFF.7DA4EE04
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Spam detection software, running on the system "h2486555.stratoserver.net",
has identified this incoming email as possible spam. The original
message has been attached to this so you can view it or label
similar future email. If you have any questions, see
@@CONTACT_ADDRESS@@ for details.
Content preview: New 6-in-1 Tactical-Survival Watch Might Be The Last Watch
You Ever Buy http://snapcugrr.us/clk.124885-5856-2-7931-1543-2813-7fc160e0-0300
http://snapcugrr.us/clk.124885-5856-20-7931-1543-2813-061573f7-0300 [...]
Content analysis details: (5.1 points, 5.0 required)
pts rule name description
---- ---------------------- --------------------------------------------------
0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked.
See
http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
for more information.
[URIs: snapcugrr.us]
1.7 URIBL_DBL_SPAM Contains an URL listed in the DBL blocklist
[URIs: snapcugrr.us]
1.2 URIBL_JP_SURBL Contains an URL listed in the JP SURBL blocklist
[URIs: snapcugrr.us]
-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
[score: 0.0000]
0.0 HTML_MESSAGE BODY: HTML included in message
0.0 HTML_FONT_LOW_CONTRAST BODY: HTML font color similar or identical to
background
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
0.9 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/)
0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid
1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level
above 50%
[cf: 100]
-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's
domain
0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50%
[cf: 100]
0.8 RDNS_NONE Delivered to internal network by a host with no rDNS
The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.
------------=_5B6B7FFF.7DA4EE04
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: attachment
Content-Transfer-Encoding: 8bit
Received: from hydra.snapcugrr.us (unknown [162.244.14.248])
by ift-informatik.de (Postfix) with ESMTP id 2A9003D200039
for <christian.gabriel@ift-informatik.de>; Thu, 9 Aug 2018 01:42:53 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=k1; d=snapcugrr.us;
h=Mime-Version:Content-Type:Date:From:Reply-To:Subject:To:Message-ID; i=info@snapcugrr.us;
bh=2AtPmjRDZXTSsjIwvN2TOFCM9YA=;
b=6aRpHrLN7i9reO3EsPgv1o3hgNpHE3sxf/pDEo1HVYorUCYS+rMPdp88wmqGda0DJE/f4TD0gz2q
Cg+56uaNrFYeqxzVgVWNAFMY2Kwl2e4398JIza13MeV4ycsDoOlXiHz4WvZGIUY9YeVhYqGzkBqZ
tDSY/qhqZblUxM61X54=
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=k1; d=snapcugrr.us;
b=vdzZiJ5QjlgD9NxG1SEtS8YK/oIkIx7OMokDya0hm+LEKmWp0Wrz4ElVdyRrr/DS22BqeWmQoAsM
FEtdSAhmloo4b5vvIhF+YIKdkoMVp7/qpNeCIVJiHqetFkh+rLCdoaCnnHeB5N+/0UrQmOOX5AL8
VULJRkb2XJdjsgJ1zH0=;
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="218adda3dd3b4fecbb64ebc6ba54fb1d_1efb_1e7d5"
Date: Thu, 9 Aug 2018 01:08:27 +0200
From: "Tactical-Survival Watch" <info@snapcugrr.us>
Reply-To: "Tactical-Survival Watch" <contact@snapcugrr.us>
Subject: New 6-in-1 Tactical-Survival Watch Might Be The Last Watch You Ever Buy
To: <christian.gabriel@ift-informatik.de>
Message-ID: <jng41hw5mckktdax-me6hyxv7odyhj30a-1efb-1e7d5@snapcugrr.us>
--218adda3dd3b4fecbb64ebc6ba54fb1d_1efb_1e7d5
Content-Type: text/plain;
Content-Transfer-Encoding: 8bit
New 6-in-1 Tactical-Survival Watch Might Be The Last Watch You Ever Buy
http://snapcugrr.us/clk.124885-5856-2-7931-1543-2813-7fc160e0-0300
http://snapcugrr.us/clk.124885-5856-20-7931-1543-2813-061573f7-0300
h a single large petal. Florets in the centre of the disc typically have no or very reduced petals. In some plants such as Narcissus the lower part of the petals or tepals are fused to form a floral cup (hypanthium) above the ovary, and from which the petals proper extend.docarp) is a fruit in which some of the flesh is derived not from the ovary but from some adjacent tissue exterior to the carpel. Examples of accessory tissue are the receptacle of the strawberry, pineapple, common fig, and mulberry, and the calyx of Gaultheria procumbens or Syzygium jambos. Pomes, such as apples and pears, are also accessory fruits, with much of the fruit flesh derived from a hypanthium. Other example could be the anthocarps specific to the family Nyctaginaceae, where most of the fruit comes from the perianth (floral whorls).
Fruit with fleshy seeds, such as pomegranate or mamoncillo, are not considered to be accessory fruit.
The terms false fruit, spurious fruit, an
Petal often consists of two parts: the upper, broad part, similar to leaf blade, also called the blade and the lower part, narrow, similar to This is where the positioning of the flower petals are located on the flower is the corolla e.g. the buttercup having shiny yellow flower petals which contain guidelines amongst the petals in aiding the pollinator towards the nectar. Pollinators have the ability to determine specific flowers they wish to pollinate. Using incentives flowers draw pollinators and set up a mutual relation between each other in which case the pollinators will remember to always guard and pollinate these flowers (unless incentives are not consistently met and competition prevails).leaf petiole, called the claw, separated from each other at the limb. Claws are developed in petals of some flowers of the family Brassicaceae, such as Erysimum cheiri.
The inception and further development of petals shows a great variety of patterns. Petals of different species of plants vary greatly in colour or colour pattern, both in visible light and in ultraviolet. Such patterns often fu
--218adda3dd3b4fecbb64ebc6ba54fb1d_1efb_1e7d5
Content-Type: text/html;
Content-Transfer-Encoding: 8bit
<html>
<head>
<title></title>
</head>
<body><a href="http://snapcugrr.us/clk.124885-5856-0-7931-1543-2813-cd0dcb19-0300"><img src="http://snapcugrr.us/ed978a9e40571fc9ab.jpg" /><img height="1" src="http://www.snapcugrr.us/clk.124885-5856-14-7931-1543-2813-e84a8e17-0300" width="1" /></a>
<div style="font-size:12px;text-align:center;width:600px">
<h1><a href="http://snapcugrr.us/clk.124885-5856-2-7931-1543-2813-7fc160e0-0300" style="color:#f10e1f;">New 6-in-1 <span style="color:#008080;">Tactical-Survival Watch</span> Might Be The Last Watch You Ever Buy</a></h1>
<center><a href="http://snapcugrr.us/clk.124885-5856-2-7931-1543-2813-7fc160e0-0300"><img alt=" " src="http://snapcugrr.us/d9624e51c34c3b6c31.jpg" /></a></center>
<h2><a href="http://snapcugrr.us/clk.124885-5856-2-7931-1543-2813-7fc160e0-0300" style="color:#0066ff;">Retails for $29.97, Click Below to See How You Can Get A Free One If We're Still In Stock</a></h2>
</div>
<p style="font-size:5px;color:#FFFFFF">h a single large petal. Florets in the centre of the disc typically have no or very reduced petals. In some plants such as Narcissus the lower part of the petals or tepals are fused to form a floral cup (hypanthium) above the ovary, and from which the petals proper extend.docarp) is a fruit in which some of the flesh is derived not from the ovary but from some adjacent tissue exterior to the carpel. Examples of accessory tissue are the receptacle of the strawberry, pineapple, common fig, and mulberry, and the calyx of Gaultheria procumbens or Syzygium jambos. Pomes, such as apples and pears, are also accessory fruits, with much of the fruit flesh derived from a hypanthium. Other example could be the anthocarps specific to the family Nyctaginaceae, where most of the fruit comes from the perianth (floral whorls). Fruit with fleshy seeds, such as pomegranate or mamoncillo, are not considered to be accessory fruit. The terms false fruit, spurious fruit, an Petal often consists of two parts: the upper, <a href="http://snapcugrr.us/clk.124885-5856-0-7931-1543-2813-cd0dcb19-0300"><img src="http://snapcugrr.us/ed978a9e40571fc9ab.jpg" /><img height="1" src="http://www.snapcugrr.us/clk.124885-5856-14-7931-1543-2813-e84a8e17-0300" width="1" /></a>broad part, similar to leaf blade, also called the blade and the lower part, narrow, similar to This is where the positioning of the flower petals are located on the flower is the corolla e.g. the buttercup having shiny yellow flower petals which contain guidelines amongst the petals in aiding the pollinator towards the nectar. Pollinators have the ability to determine specific flowers they wish to pollinate. Using incentives flowers draw pollinators and set up a mutual relation between each other in which case the pollinators will remember to always guard and pollinate these flowers (unless incentives are not consistently met and competition prevails).leaf petiole, called the claw, separated from each other at the limb. Claws are developed in petals of some flowers of the family Brassicaceae, such as Erysimum cheiri. The inception and further development of petals shows a great variety of patterns. Petals of different species of plants vary greatly in colour or colour pattern, both in visible light and in ultraviolet. Such patterns often fu</p>
<br />
<br />
<br />
<br />
<b><a href="http://snapcugrr.us/clk.124885-5856-12-7931-1543-2813-afc8b438-0300"><img alt="UN_subscribe" src="http://snapcugrr.us/ec667c3264a6237634.jpg" /></a></b><br />
</body>
</html>
--218adda3dd3b4fecbb64ebc6ba54fb1d_1efb_1e7d5--
------------=_5B6B7FFF.7DA4EE04--