From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server-vie001.gnuweeb.org X-Spam-Level: **** X-Spam-Status: No, score=4.7 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, HTML_MESSAGE,LOTS_OF_MONEY,NO_RELAYS,URIBL_ABUSE_SURBL,URIBL_BLACK, URIBL_DBL_BLOCKED_OPENDNS,URIBL_ZEN_BLOCKED_OPENDNS autolearn=no autolearn_force=no version=3.4.6 Received: by server-vie001.gnuweeb.org (Postfix, from userid 1000) id 41A312071BD7; Sun, 29 Dec 2024 22:55:02 +0000 (UTC) Received: from localhost by server-vie001.gnuweeb.org with SpamAssassin (version 3.4.6); Sun, 29 Dec 2024 22:55:02 +0000 From: Invoices To: gwml@gnuweeb.org Subject: Fwd:Payment Invoices REF#520979 Date: 30 Dec 2024 05:54:59 +0700 Message-ID: <20241230055459.923853A6A67FB81D@biotroll.net.pk> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----------=_6771D346.E2755A4E" List-Id: Message-ID: <20241229225459.y3NTOVQr66kEAOFwDIZHJ17aSP1wzTT55G-0vrOx70M@z> This is a multi-part message in MIME format. ------------=_6771D346.E2755A4E Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit Spam detection software, running on the system "server-vie001.gnuweeb.org", has identified this incoming email as possible spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see @@CONTACT_ADDRESS@@ for details. Content preview: MT103 Payment Advise As instructed by our customer, please see below USD 112,271.77 credit notification for View Full Payment Copy Content analysis details: (7.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 1.7 URIBL_BLACK Contains an URL listed in the URIBL blacklist [URIs: arguiria.cfd] 1.9 URIBL_ABUSE_SURBL Contains an URL listed in the ABUSE SURBL blocklist [URIs: arguiria.cfd] 1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net [Blocked - see ] 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [103.67.163.208 listed in list.dnswl.org] 0.7 SPF_NEUTRAL SPF: sender does not match SPF record (neutral) 0.1 MIME_HTML_ONLY BODY: Message only has text/html MIME parts 0.0 HTML_MESSAGE BODY: HTML included in message 0.0 URIBL_ZEN_BLOCKED_OPENDNS ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/ [URIs: arguiria.cfd] 0.0 RCVD_IN_ZEN_BLOCKED_OPENDNS RBL: ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/ [103.67.163.208 listed in zen.spamhaus.org] 0.0 URIBL_DBL_BLOCKED_OPENDNS ADMINISTRATOR NOTICE: The query to dbl.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/ [URIs: arguiria.cfd] 0.0 LOTS_OF_MONEY Huge... sums of money 1.3 RDNS_NONE Delivered to internal network by a host with no rDNS 1.0 TO_NO_BRKTS_NORDNS_HTML To: lacks brackets and no rDNS and HTML only The original message was not completely plain text, and may be unsafe to open with some email clients; in particular, it may contain a virus, or confirm that your address can receive spam. If you wish to view it, it may be safer to save it to a file and open it with an editor. ------------=_6771D346.E2755A4E Content-Type: message/rfc822; x-spam-type=original Content-Description: original message before SpamAssassin Content-Disposition: attachment Content-Transfer-Encoding: 8bit Received-SPF: Neutral (mailfrom) identity=mailfrom; client-ip=103.67.163.208; helo=[103.67.163.208]; envelope-from=accounts@biotroll.net.pk; receiver= Received: from [103.67.163.208] (unknown [103.67.163.208]) by server-vie001.gnuweeb.org (Postfix) with ESMTP id 3D4E02071BCD for ; Sun, 29 Dec 2024 22:55:00 +0000 (UTC) Reply-To: From: Invoices To: gwml@gnuweeb.org Subject: Fwd:Payment Invoices REF#520979 Date: 30 Dec 2024 05:54:59 +0700 Message-ID: <20241230055459.923853A6A67FB81D@biotroll.net.pk> MIME-Version: 1.0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
 
 

 MT103 Payment Advise

As instructed by our customer, please see below USD 112,271.77 credit no= tification for

 

 

View Full Payment Copy
 

Swift Input: FIN 103 Single Customer Credit Transfer

Sending Bank: CITIUS33XXX CITIBANK N.A (NY, US)
Sender's Referen= ce: OUFTT-23-31413
Bank Operation Code: CRED

Payment Date: 29/12/2024

 

 

12/30/2024 5:54:59 a.m.

Payment method:=  MT103 Wire Transfer

Currency: USD

       

2024 JPMorgan Chase & Co. All Rights Reserved.

“Chase,” “JPMorgan,” “JPMorgan Chase,̶= 1; the JPMorgan Chase logo and the Octagon Symbol are trademarks of JPMorga= n Chase Bank, N.A.  JPMorgan Chase Bank, N.A. is a wholly-owned s= ubsidiary of JPMorgan Chase & Co.

Bank deposit accounts, such as checking and savings, may be subject to a= pproval. Deposit products and related services are offered by JPMorgan Chas= e Bank, N.A. Member FDIC.

J.P. Morgan Privacy = & Security Terms of Use=

No longer want to receive these emails? Unsubscribe=   .

------------=_6771D346.E2755A4E--