Sextortion
Abuser: unknown
Received: (qmail 890893 invoked from network); 25 Dec 2022 01:03:54 -0000 Received: by simscan 1.4.0 ppid: 890674, pid: 890825, t: 7.4425s scanners: clamav: 0.103.7/m:62/d:26760 spam: 3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on ... X-Spam-Flag: YES X-Spam-Level: ********* X-Spam-Status: Yes, score=9.7 required=5.0 tests=BITCOIN_SPAM_07,HTML_MESSAGE, KHOP_HELO_FCRDNS,MIME_HTML_ONLY,PDS_BTC_ID,RCVD_IN_SBL, RCVD_IN_VALIDITY_RPBL,RDNS_DYNAMIC,SPF_HELO_NONE, TO_EQ_FM_DOM_HTML_ONLY autolearn=disabled version=3.4.6 X-Spam-Report: * 2.6 RCVD_IN_SBL RBL: Received via a relay in Spamhaus SBL * [187.141.133.210 listed in zen.spamhaus.org] * 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record * 1.3 RCVD_IN_VALIDITY_RPBL RBL: Relay in Validity RPBL, * https://senderscore.org/blocklistlookup/ * [187.141.133.210 listed in bl.score.senderscore.com] * 0.0 HTML_MESSAGE BODY: HTML included in message * 0.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts * 0.4 RDNS_DYNAMIC Delivered to internal network by host with * dynamic-looking rDNS * 0.5 PDS_BTC_ID FP reduced Bitcoin ID * 3.5 BITCOIN_SPAM_07 BitCoin spam pattern 07 * 0.4 KHOP_HELO_FCRDNS Relay HELO differs from its IP's reverse DNS * 1.0 TO_EQ_FM_DOM_HTML_ONLY To domain == From domain and HTML only Received: from customer-187-141-133-210-sta.uninet-ide.com.mx (HELO mailsrv.pcponline.com.mx) (187.141.133.210) by sh07.blueserver.eu with SMTP; 25 Dec 2022 01:03:47 -0000 Received: from [192.141.244.141] (192.168.0.254) by MailSRV.pcponline.com.mx (192.168.0.3) with Microsoft SMTP Server id 8.1.340.0; Sat, 24 Dec 2022 18:01:41 -0700 ... Subject: En espera del pago.
United States, 2022-12-25 23:49:11