Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /proc/thread-self/root/home/ift/mails/36/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : //proc/thread-self/root/home/ift/mails/36/1539774656.zrspam.366664_2018_10_17

From Benfosxi@comcastbusiness.net  Wed Oct 17 13:10:56 2018
Return-Path: <Benfosxi@comcastbusiness.net>
X-Original-To: cgabriel@ift-informatik.de
Delivered-To: cgabriel@ift-informatik.de
Received: by ift-informatik.de (Postfix, from userid 5555)
	id 1DF8D3D200055; Wed, 17 Oct 2018 13:10:56 +0200 (CEST)
Received: from localhost by h2486555.stratoserver.net
	with SpamAssassin (version 3.4.0);
	Wed, 17 Oct 2018 13:10:56 +0200
From: "Leoni" <Benfosxi@comcastbusiness.net>
To: "Leoni" <info@ift-informatik.de>
Subject: *****SPAM***** I would love to test you ;)
Date: Wed, 17 Oct 2018 03:05:29 -0700
Message-Id: <F28C0AB8.2EF0B899@comcastbusiness.net>
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on
	h2486555.stratoserver.net
X-Spam-Flag: YES
X-Spam-Level: ************************
X-Spam-Status: Yes, score=24.9 required=5.0 tests=BAYES_99,
	CK_HELO_DYNAMIC_SPLIT_IP,DIGEST_MULTIPLE,HELO_DYNAMIC_IPADDR2,
	HTML_IMAGE_ONLY_08,HTML_MESSAGE,HTML_SHORT_LINK_IMG_1,MIME_HTML_ONLY,
	PYZOR_CHECK,RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK,
	RCVD_IN_BL_SPAMCOP_NET,RCVD_IN_BRBL_LASTEXT,RCVD_IN_MSPIKE_BL,
	RCVD_IN_MSPIKE_L5,RCVD_IN_RP_RNBL,RDNS_DYNAMIC,T_REMOTE_IMAGE,URIBL_BLOCKED,
	URIBL_JP_SURBL,URIBL_SBL,URIBL_SBL_A autolearn=spam autolearn_force=no
	version=3.4.0
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----------=_5BC718C0.788B40E6"

This is a multi-part message in MIME format.

------------=_5BC718C0.788B40E6
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit

Spam detection software, running on the system "h2486555.stratoserver.net",
has identified this incoming email as possible spam.  The original
message has been attached to this so you can view it or label
similar future email.  If you have any questions, see
@@CONTACT_ADDRESS@@ for details.

Content preview:  Only VIP girls and women for hot sex here. Complete anonymity
   and security. http://hotgirlshere.su/vip/ [...] 

Content analysis details:   (24.9 points, 5.0 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 1.2 URIBL_JP_SURBL         Contains an URL listed in the JP SURBL blocklist
                            [URIs: hotgirlshere.su]
 0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                            See
                            http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                             for more information.
                            [URIs: hotgirlshere.su]
 0.1 URIBL_SBL_A            Contains URL's A record listed in the SBL blocklist
                            [URIs: hotgirlshere.su]
 1.6 URIBL_SBL              Contains an URL's NS IP listed in the SBL blocklist
                            [URIs: hotgirlshere.su]
 1.3 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
             [Blocked - see <http://www.spamcop.net/bl.shtml?173.160.253.212>]
 3.5 BAYES_99               BODY: Bayes spam probability is 99 to 100%
                            [score: 1.0000]
 0.0 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname
                            (Split IP)
 1.3 RCVD_IN_RP_RNBL        RBL: Relay in RNBL,
                            https://senderscore.org/blacklistlookup/
                          [173.160.253.212 listed in bl.score.senderscore.com]
 2.4 RCVD_IN_MSPIKE_L5      RBL: Very bad reputation (-5)
                            [173.160.253.212 listed in bl.mailspike.net]
 1.4 RCVD_IN_BRBL_LASTEXT   RBL: No description available.
                           [173.160.253.212 listed in bb.barracudacentral.org]
 0.7 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
 0.0 HTML_MESSAGE           BODY: HTML included in message
 1.7 HTML_IMAGE_ONLY_08     BODY: HTML: images with 400-800 bytes of words
 1.4 PYZOR_CHECK            Listed in Pyzor (http://pyzor.sf.net/)
 1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level
                            above 50%
                            [cf: 100]
 0.9 RAZOR2_CHECK           Listed in Razor2 (http://razor.sf.net/)
 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50%
                            [cf: 100]
 0.0 HTML_SHORT_LINK_IMG_1  HTML is very short with a linked image
 3.6 HELO_DYNAMIC_IPADDR2   Relay HELO'd using suspicious hostname (IP addr
                            2)
 0.3 DIGEST_MULTIPLE        Message hits more than one network digest check
 1.0 RDNS_DYNAMIC           Delivered to internal network by host with
                            dynamic-looking rDNS
 0.0 RCVD_IN_MSPIKE_BL      Mailspike blacklisted
 0.0 T_REMOTE_IMAGE         Message contains an external image

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam.  If you wish to view
it, it may be safer to save it to a file and open it with an editor.


------------=_5BC718C0.788B40E6
Content-Type: message/rfc822; x-spam-type=original
Content-Description: original message before SpamAssassin
Content-Disposition: attachment
Content-Transfer-Encoding: 8bit

Received: from 173-160-253-212-Washington.hfc.comcastbusiness.net (173-160-253-212-Washington.hfc.comcastbusiness.net [173.160.253.212])
	by ift-informatik.de (Postfix) with ESMTP id 61CBB3D200003
	for <info@ift-informatik.de>; Wed, 17 Oct 2018 13:10:51 +0200 (CEST)
Received: from [151.2.190.241] by mmx09.tilkbans.com with QMQP; Wed, 17 Oct 2018 03:07:20 -0700
Received: from relay.2yahoo.com ([4.143.161.192]) by smtp.mixedthings.net with QMQP; Wed, 17 Oct 2018 03:05:29 -0700
Message-ID: <F28C0AB8.2EF0B899@comcastbusiness.net>
Date: Wed, 17 Oct 2018 03:05:29 -0700
From: "Leoni" <Benfosxi@comcastbusiness.net>
User-Agent: Mozilla 4.73 [de]C-CCK-MCD DT  (Win98; U)
X-Accept-Language: en-us
MIME-Version: 1.0
To: "Leoni" <info@ift-informatik.de>
Subject: I would love to test you ;)
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: base64

PCFkb2N0eXBlIGh0bWw+DQo8aHRtbD4NCjxoZWFkPg0KPG1ldGEgY2hhcnNldD0idXRmLTgiPg0K
PC9oZWFkPg0KDQo8Ym9keT4NCjxwPjxoZWFkZXI+PC9oZWFkZXI+PC9wPg0KPHA+T25seSBWSVAg
Z2lybHMgYW5kIHdvbWVuIGZvciBob3Qgc2V4IGhlcmUuPGJyLz4NCkNvbXBsZXRlIGFub255bWl0
eSBhbmQgc2VjdXJpdHkuPC9wPg0KPHA+PGhyPjwvcD4NCjxhICAgaHJlZj0iaHR0cDovL2hvdGdp
cmxzaGVyZS5zdS92aXAvIiB0YXJnZXQ9Il9ibGFuayIgc3R5bGU9ImZvbnQtd2VpZ2h0OiBub3Jt
YWw7bGV0dGVyLXNwYWNpbmc6IG5vcm1hbDtsaW5lLWhlaWdodDogMTAwJTt0ZXh0LWRlY29yYXRp
b246IG5vbmU7Y29sb3I6ICM3Nzc7Ij5odHRwOi8vaG90Z2lybHNoZXJlLnN1L3ZpcC88L2E+DQo8
cD48dWw+PC91bD48L3A+DQo8YSBocmVmPSJodHRwOi8vaG90Z2lybHNoZXJlLnN1L3ZpcC8iPjxp
bWcgc3JjPSJodHRwczovLzY2Lm1lZGlhLnR1bWJsci5jb20vYTA5Zjk5YTFjNWFmMmZhOGU4MzEy
NjgzN2QwMDZjYjAvdHVtYmxyX29hazdpNTFmcjYxdnY0Y21qbzFfNDAwLmdpZiIgYWx0PSJJZiB5
b3UgY2xpY2sgaGVyZSwgeW91IGNhbiBzZWUgbXkgcGhvdG8iIGJvcmRlcj0iMCIgPjwvYT4NCjxw
PjxsYWJlbD48L2xhYmVsPjwvcD4NCjwvYm9keT4NCjwvaHRtbD4NCg==


------------=_5BC718C0.788B40E6--


bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net