HEX
Server: Apache
System: Linux zacp120.webway.host 4.18.0-553.50.1.lve.el8.x86_64 #1 SMP Thu Apr 17 19:10:24 UTC 2025 x86_64
User: govancoz (1003)
PHP: 8.3.26
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/govancoz/mail/.spam/new/1699236637.M866109P616411.zacp120.ve.host,S=3185,W=3251
Return-Path: <unationvictim@aol.com>
Delivered-To: govancoz+spam@zacp120.ve.host
Received: from zacp120.ve.host
	by zacp120.ve.host with LMTP
	id mHRMMh1LSGXbZwkAvcbEzQ
	(envelope-from <unationvictim@aol.com>)
	for <govancoz+spam@zacp120.ve.host>; Mon, 06 Nov 2023 04:10:37 +0200
Return-path: <unationvictim@aol.com>
Envelope-to: khumalo@govan.co.za
Delivery-date: Mon, 06 Nov 2023 04:10:37 +0200
Received: from static.105.135.4.185.clients.grserver.gr ([185.4.135.105]:43144 helo=server.inexpert.gr)
	by zacp120.ve.host with esmtps  (TLS1.3) tls TLS_AES_256_GCM_SHA384
	(Exim 4.96.2)
	(envelope-from <unationvictim@aol.com>)
	id 1qzp4U-002a7p-0c
	for khumalo@govan.co.za;
	Mon, 06 Nov 2023 04:10:37 +0200
Received: from [192.168.8.215] (unknown [197.184.179.253])
	by server.inexpert.gr (Postfix) with ESMTPA id C22BEE0BF;
	Mon,  6 Nov 2023 03:02:45 +0200 (EET)
Authentication-Results: server.inexpert.gr;
        spf=pass (sender IP is 197.184.179.253) smtp.mailfrom=unationvictim@aol.com smtp.helo=[192.168.8.215]
Received-SPF: pass (server.inexpert.gr: connection is authenticated)
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Content-Description: Mail message body
To: Me <unationvictim@aol.com>
From: John Smith<unationvictim@aol.com>
Date: Mon, 06 Nov 2023 03:02:50 +0200
Reply-To: unationvictim@aol.com
X-Priority: 1 (High)
Sensitivity: Company-Confidential
X-Spam-Status: Yes, score=8.2
X-Spam-Score: 82
X-Spam-Bar: ++++++++
X-Spam-Report: Spam detection software, running on the system "zacp120.ve.host",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  Goodnews,Take this update seriously as you have just been
   shortlisted for 2023IMF compensation relief grant.For info,email: 
 Content analysis details:   (8.2 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in
                             bl.spamcop.net
               [Blocked - see <https://www.spamcop.net/bl.shtml?185.4.135.105>]
  1.5 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)
  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail
                             provider
                             [unationvictim[at]aol.com]
 -0.0 T_SCC_BODY_TEXT_LINE   No description available.
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  3.0 KAM_DMARC_REJECT       DKIM has Failed or SPF has failed on the
                             message and the domain has a DMARC reject
                             policy
  2.5 FROM_MISSP_REPLYTO     From misspaced, has Reply-To
  0.0 SPOOFED_FREEMAIL       No description available.
X-Spam-Flag: YES
Subject:  ***SPAM***  COMPENSATION

Goodnews,Take this update seriously as you have just been shortlisted for 2=
023IMF compensation relief grant.For info,email: